Skip to content

Commit 568bd3f

Browse files
author
Angela Fleischmann
authored
Merge pull request #6693 from MicrosoftDocs/main
Publish 02/02/2022 3:30 PM PT
2 parents d08f99c + 02aa350 commit 568bd3f

18 files changed

Lines changed: 263 additions & 94 deletions

memdocs/configmgr/core/clients/deploy/deploy-clients-to-windows-computers.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -339,11 +339,13 @@ Preinstall the Configuration Manager client on a reference computer that you use
339339
340340
2. At a command prompt, type `net stop ccmexec` to stop the SMS Agent Host service (CcmExec.exe) on the reference computer.
341341

342-
3. Delete the SMSCFG.INI file from the Windows folder on the reference computer.
342+
3. Delete the SMSCFG.INI file from the Windows folder on the reference computer.
343343

344-
4. Remove any certificates that are stored in the local computer store on the reference computer. For example, if you use PKI certificates, before you image the computer, remove the certificates in the **Personal** store for **Computer** and **User**.
344+
4. Remove the certificates from the local computer's **SMS** certificate store.
345345

346-
5. If the clients are installed in a different Configuration Manager hierarchy than the hierarchy of the reference computer, remove the trusted root key from the reference computer.
346+
5. Remove any other valid client authentication certificates that are stored in the local computer store on the reference computer. For example, if you use PKI certificates, before you image the computer, remove the certificates in the **Personal** store for **Computer** and **User**.
347+
348+
6. If the clients are installed in a different Configuration Manager hierarchy than the hierarchy of the reference computer, remove the trusted root key from the reference computer.
347349

348350
> [!NOTE]
349351
> If clients can't query Active Directory Domain Services to locate a management point, they use the trusted root key to determine trusted management points. If you deploy all imaged clients in the same hierarchy as that of the master computer, leave the trusted root key in place.

memdocs/intune/apps/app-configuration-policies-managed-app.md

Lines changed: 28 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Configuration policies for managed apps without device enrollment
4+
title: Configuration policies for Intune App SDK managed apps
55
titleSuffix: Microsoft Intune
6-
description: Learn how to configure policies for managed apps without device enrollment.
6+
description: Learn how to configure policies for Intune App SDK managed apps.
77
keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 12/16/2021
11+
ms.date: 01/28/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -29,33 +29,44 @@ ms.custom: intune-azure
2929
ms.collection: M365-identity-device-management
3030
---
3131

32-
# Add app configuration policies for managed apps without device enrollment
32+
# App configuration policies for Intune App SDK managed apps
3333

3434
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
3535

36-
You can use app configuration policies with managed apps that support the Intune App SDK, even on devices that are not enrolled.
36+
The Intune App Software Development Kit (SDK) supports app configuration delivery through the mobile app management (MAM) channel. Within the Intune portal, the MAM channel is referred to as a Managed Apps app configuration policy. The MAM channel is different than the mobile device management (MDM) OS platform channels that are offered when a device is enrolled.
37+
38+
To support app configuration through the MAM channel, the app must be integrated with [Intune App SDK](../developer/app-sdk.md). Line-of-business apps can either integrate the Intune App SDK or use the [Intune App Wrapping Tool](../developer/apps-prepare-mobile-application-management.md). For a comparison between the Intune App SDK and the Intune App Wrapping Tool, see [Prepare line-of-business apps for app protection policies](../developer/apps-prepare-mobile-application-management.md#feature-comparison).
39+
40+
By using the MAM channel, apps can receive app configuration policies regardless of the device enrollment state. For information on which apps support app configuration through the MAM channel, see [Microsoft Intune protected apps](apps-supported-intune-apps.md). Documentation from the app vendor should be reviewed to see what configurations are available and how the configurations influence the behavior of the app.
41+
42+
For more information, see [App configuration policies for Microsoft Intune](app-configuration-policies-overview.md).
43+
44+
[!INCLUDE [android-supported-os](../includes/android-supported-os.md)]
45+
46+
## Add a Managed apps app configuration policy
47+
48+
Use the following steps to create a Managed apps app configuration policy. After the configuration is created, you can assign its settings to groups of users.
3749

3850
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
3951
2. Choose the **Apps** > **App configuration policies** > **Add** > **Managed apps**.
4052
3. On the **Basics** page, set the following details:
4153
- **Name**: The name of the profile that will appear in the portal.
4254
- **Description**: The description of the profile that will appear in the portal.
4355
- **Device enrollment type**: Managed apps is selected.
44-
4. Choose either **Select public apps** or **Select custom apps** to choose the app that you are going to configure. Select the app from the list of apps that you have approved and synchronized with Intune.
56+
4. Choose either **Select public apps** or **Select custom apps** to choose the app that you are going to configure. Select the app from the list of apps that you've approved and synchronized with Intune.
4557
5. Click **Next** to display the **Settings** page.
4658
6. The **Settings page** provides options that are displayed based on the app that you're configuring:
4759

48-
- **General configuration settings** - For each general configuration setting that the app supports, type the **Name** and **Value**.
49-
50-
Intune App SDK-enabled apps support configurations in key/value pairs. To learn more about which key-value configurations are supported, consult the documentation for each app. Note that you can use tokens that will be dynamically populated with data generated by the application. To delete a general configuration setting, choose the ellipsis (****) and select **Delete**. For more information, see [Configuration values for using tokens](app-configuration-policies-managed-app.md#configuration-values-for-using-tokens).
60+
- **General configuration settings** - For each general configuration setting that the app supports, type the **Name** and **Value**.
61+
62+
Intune App SDK-enabled apps support configurations in key/value pairs. To learn more about which key-value configurations are supported, consult the documentation for each app. Note that you can use tokens that will be dynamically populated with data generated by the application. To delete a general configuration setting, choose the ellipsis (****) and select **Delete**. For more information, see [Configuration values for using tokens](app-configuration-policies-managed-app.md#configuration-values-for-using-tokens).
63+
64+
For information about app configuration settings for specific Microsoft apps, see:
5165

52-
- **Outlook configuration settings** - Outlook for iOS and Android offers administrators the ability to customize the default configuration for several in-app settings. For more information, see [Outlook for iOS and Android - General app configuration scenarios](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/outlook-for-ios-and-android-configuration-with-microsoft-intune#general-app-configuration-scenarios).
53-
54-
- **S/MIME** - Secure Multipurpose Internet Mail Extensions (S/MIME) is a specification that allows users to send and receive digitally signed and encrypted emails.
55-
- **Enable S/MIME** - Specify whether or not S/MIME controls are enabled when composing an email. Default value: **Not configured**.
56-
- **Allow user to change setting** - Specify if the user is allowed to change the setting. S/MIME must be enabled. Default value: **Yes**.
57-
58-
For information about Outlook app configuration policy settings, see [Deploying Outlook for iOS and Android app configuration settings](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/outlook-for-ios-and-android-configuration-with-microsoft-intune).
66+
- [Manage web access by using Edge for iOS and Android with Microsoft Intune](manage-microsoft-edge.md)
67+
- [Manage collaboration experiences in Office for iOS and Android with Microsoft Intune](manage-microsoft-office.md)
68+
- [Deploying Outlook for iOS and Android app configuration settings](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/outlook-for-ios-and-android-configuration-with-microsoft-intune)
69+
- [Manage collaboration experiences in Teams for iOS and Android with Microsoft Intune](manage-microsoft-teams.md)
5970

6071
7. Click **Next** to display the **Assignments** page.
6172
8. Click **Select groups to include**.
@@ -73,7 +84,7 @@ You can use app configuration policies with managed apps that support the Intune
7384

7485
Intune can generate certain tokens and send them to the managed application. For example, if your app configuration can use an email setting, you can add a dynamic email by using a token. Type the name expected by the app in the **Name** field, and then type `{{mail}}` in the **Value** field.
7586

76-
Intune supports the following token types in the configuration settings. Other custom key/value pairs are not supported.
87+
Intune supports the following token types in the configuration settings. Other custom key/value pairs aren't supported.
7788

7889
- \{\{userprincipalname\}\}—for example, [email protected]
7990
- \{\{mail\}\}—for example, [email protected]

0 commit comments

Comments
 (0)