|
4 | 4 | title: Microsoft Enterprise SSO plug-in in Jamf Pro |
5 | 5 | description: Add or create a macOS device profile using the Microsoft Enterprise SSO plug-in in Jamf Pro. |
6 | 6 | keywords: |
7 | | -author: Michael Epping |
| 7 | +author: mepples21 |
8 | 8 | ms.author: miepping |
9 | 9 | manager: |
10 | 10 | ms.date: 03/9/2022 |
@@ -144,14 +144,14 @@ In the Jamf Pro portal, you create a Computer or Device configuration profile. |
144 | 144 |
|
145 | 145 | - These PLIST settings configure the following SSO Extension options: |
146 | 146 |
|
147 | | - | Key | Type | Value | |
148 | | - | --- | --- | --- | |
149 | | - | **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).| |
150 | | - | **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.| |
151 | | - | **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. | |
| 147 | +| Key | Type | Value | |
| 148 | +| --- | --- | --- | |
| 149 | +| **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).| |
| 150 | +| **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.| |
| 151 | +| **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. | |
152 | 152 |
|
153 | | - > [!TIP] |
154 | | - > For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options). |
| 153 | +> [!TIP] |
| 154 | +> For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options). |
155 | 155 |
|
156 | 156 | 6. Select the **Scope** tab. Specify the computers or devices that should be targeted to receive the SSO Extension MDM profile. |
157 | 157 | 7. Select **Save**. |
|
0 commit comments