|
| 1 | +--- |
| 2 | +# required metadata |
| 3 | + |
| 4 | +title: Microsoft Enterprise SSO plug-in in Jamf Pro |
| 5 | +description: Add or create a macOS device profile using the Microsoft Enterprise SSO plug-in in Jamf Pro. |
| 6 | +keywords: |
| 7 | +author: Michael Epping |
| 8 | +ms.author: miepping |
| 9 | +manager: |
| 10 | +ms.date: 03/9/2022 |
| 11 | +ms.topic: how-to |
| 12 | +ms.service: microsoft-intune |
| 13 | +ms.subservice: configuration |
| 14 | +ms.localizationpriority: high |
| 15 | +ms.technology: |
| 16 | + |
| 17 | +# optional metadata |
| 18 | + |
| 19 | +#ROBOTS: |
| 20 | +#audience: |
| 21 | + |
| 22 | +ms.reviewer: beflamm |
| 23 | +ms.suite: ems |
| 24 | +search.appverid: MET150 |
| 25 | +#ms.tgt_pltfrm: |
| 26 | +ms.custom: intune-azure |
| 27 | +ms.collection: M365-identity-device-management |
| 28 | +--- |
| 29 | + |
| 30 | +# Use the Microsoft Enterprise SSO plug-in on iOS/iPadOS and macOS devices in Jamf Pro |
| 31 | + |
| 32 | +The Microsoft Enterprise SSO plug-in (preview) provides single sign-on (SSO) to apps and websites that use Microsoft Azure Active Directory (AAD) for authentication, including Microsoft 365. This plug-in uses the Apple single sign on app extension framework. It reduces the number of authentication prompts users get when using devices managed by Mobile Device Management (MDM), including Jamf Pro. |
| 33 | + |
| 34 | +Once set up, apps that support the Microsoft Authentication Library (MSAL) automatically take advantage of the Microsoft Enterprise SSO plug-in (preview). Apps that don't support MSAL can be allowed to use the extension. Just add the application bundle ID or prefix to the extension configuration. |
| 35 | + |
| 36 | +For example, to allow a Microsoft app that doesn't support MSAL, add `com.microsoft.` to the **AppPrefixAllowList** property. Be careful with the apps you allow. They automatically use the user's credentials to authenticate. |
| 37 | + |
| 38 | +For more information, see [Microsoft Enterprise SSO plug-in for Apple devices - apps that don't use MSAL](/azure/active-directory/develop/apple-sso-plugin#applications-that-dont-use-msal). |
| 39 | + |
| 40 | +This feature applies to: |
| 41 | + |
| 42 | +- iOS/iPadOS |
| 43 | +- macOS |
| 44 | + |
| 45 | +This article shows how to deploy the Microsoft Enterprise SSO plug-in (preview) for Apple Devices with Jamf Pro. |
| 46 | + |
| 47 | +> [!IMPORTANT] |
| 48 | +> The Microsoft Enterprise SSO plug-in for Apple Devices is in public preview. This preview version is provided without a service level agreement (SLA). It's not recommended to use in production. Certain features might not be supported or might have restricted behavior. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). |
| 49 | +
|
| 50 | +## Prerequisites |
| 51 | + |
| 52 | +To use the Microsoft Enterprise SSO plug-in for Apple devices: |
| 53 | + |
| 54 | +- The device must support the plug-in: |
| 55 | + |
| 56 | + - iOS/iPadOS 13.0 and newer |
| 57 | + - macOS 10.15 and newer |
| 58 | + |
| 59 | +- On iOS/iPadOS 13.0 and newer devices, install the Microsoft Authenticator app. |
| 60 | + |
| 61 | + The Microsoft Authenticator app can be installed manually by users, or by deploying the app through Jamf Pro. For information on how to install the Microsoft Authenticator app, see [Jamf Pro's documentation](https://docs.jamf.com/10.24.1/jamf-pro/administrator-guide/App_Store_Apps.html). |
| 62 | + |
| 63 | +- On macOS 10.15 and newer devices, install the Company Portal app. |
| 64 | + |
| 65 | + The Company Portal app can be installed manually by users, or by deploying the app through Jamf Pro. For a list of options on how to install the Company Portal app, see [Jamf Pro's documentation](https://docs.jamf.com/10.24.1/jamf-pro/administrator-guide/Managing_macOS_Installers.html). |
| 66 | + |
| 67 | +> [!NOTE] |
| 68 | +> On Apple devices, Apple requires that the SSO app extension and the app (Authenticator or Company Portal) be installed. Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device. **[Jamf Pro and Intune integration for device compliance](../protect/conditional-access-integrate-jamf.md) is not required to use the SSO app extension.** |
| 69 | +
|
| 70 | +## Microsoft Enterprise SSO plug-in vs. Kerberos SSO extension |
| 71 | + |
| 72 | +In Jamf Pro, when you use the SSO app extension, you use the **SSO** or **Kerberos** Payload Type for authentication. The SSO app extension is designed to improve the sign-in experience for apps and websites that use these authentication methods. |
| 73 | + |
| 74 | +The Microsoft Enterprise SSO plug-in uses the **SSO** Payload Type with **Redirect** authentication. The SSO Redirect and Kerberos extension types can both be used on a device. Be sure to create separate device profiles. |
| 75 | + |
| 76 | +To determine the correct SSO extension type for your scenario, use the following table: |
| 77 | + |
| 78 | +--- |
| 79 | +| Microsoft Enterprise SSO plug-in for Apple Devices | Single sign-on app extension with Kerberos | |
| 80 | +| --- | --- | |
| 81 | +| Uses the **SSO Redirect** SSO app extension type | Uses the **Kerberos** SSO app extension type| |
| 82 | +| Supports the following apps:<br/><br/>- Microsoft 365 <br/>- Apps, websites or services integrated with Azure AD | Supports the following apps:<br/><br/>- Apps, websites or services integrated with AD | |
| 83 | + |
| 84 | +--- |
| 85 | + |
| 86 | +For more information on the single sign-on extension, see [Single sign-on app extension](device-features-configure.md#single-sign-on-app-extension). |
| 87 | + |
| 88 | +## Create a single sign-on app extension configuration profile in Jamf Pro |
| 89 | + |
| 90 | +In the Jamf Pro portal, you create a Computer or Device configuration profile. This profile includes the settings to configure the SSO app extension on devices. |
| 91 | + |
| 92 | +1. Sign in to the Jamf Pro portal. |
| 93 | +2. Select **Computers** > **Configuration profiles** > **New** to create a macOS profile or select **Devices** > **Configuration profiles** > **New** to create an iOS/iPadOS profile. |
| 94 | + |
| 95 | +:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/jamf-pro-configuration-profiles.png" alt-text="Navigation to Jamf Pro portal configuration profiles for macOS"::: |
| 96 | + |
| 97 | +3. Scroll down in the Options column and select **Single Sign-On Extensions** > **Add**. |
| 98 | + |
| 99 | +:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-creation.png" alt-text="Select configuration profiles SSO option and click add"::: |
| 100 | + |
| 101 | +4. Enter the following properties: |
| 102 | + |
| 103 | + - **Payload Type**: SSO |
| 104 | + - **Extension Identifier**: |
| 105 | + - **macOS**: com.microsoft.CompanyPortalMac.ssoextension |
| 106 | + - **iOS/iPadOS**: com.microsoft.azureauthenticator.ssoextension |
| 107 | + - **Team Identifier**: |
| 108 | + - **macOS**: UBF8T346G9 |
| 109 | + - **iOS/iPadOS**: No value is needed, leave the field blank. |
| 110 | + - **Sign-On Type**: Redirect |
| 111 | + - **URLs**: |
| 112 | + - `https://login.microsoftonline.com` |
| 113 | + - `https://login.microsoft.com` |
| 114 | + - `https://sts.windows.net` |
| 115 | + - `https://login.partner.microsoftonline.cn` |
| 116 | + - `https://login.chinacloudapi.cn` |
| 117 | + - `https://login.microsoftonline.de` |
| 118 | + - `https://login.microsoftonline.us` |
| 119 | + - `https://login.usgovcloudapi.net` |
| 120 | + - `https://login-us.microsoftonline.com` |
| 121 | + |
| 122 | +:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-1.png" alt-text="Basic configuration settings part 1"::: |
| 123 | + |
| 124 | +:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-2.png" alt-text="Basic configuration settings part 2"::: |
| 125 | + |
| 126 | +5. In **Custom Configuration** you will define other required properties. Jamf Pro requires that these properties are configured via an uploaded PLIST file. The full list of configurable properties is covered in the [Azure AD Apple SSO Extension documentation](/azure/active-directory/develop/apple-sso-plugin#manual-configuration-for-other-mdm-services). This is a recommended PLIST file that will meet the needs of most organizations: |
| 127 | + |
| 128 | +```xml |
| 129 | +<?xml version="1.0" encoding="UTF-8"?> |
| 130 | +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> |
| 131 | +<plist version="1.0"> |
| 132 | +<dict> |
| 133 | + <key>AppPrefixAllowList</key> |
| 134 | + <string>com.microsoft.,com.apple.</string> |
| 135 | + <key>browser_sso_interaction_enabled</key> |
| 136 | + <integer>1</integer> |
| 137 | + <key>disable_explicit_app_prompt</key> |
| 138 | + <integer>1</integer> |
| 139 | +</dict> |
| 140 | +</plist> |
| 141 | +``` |
| 142 | + |
| 143 | +:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-custom-configuration-plist.png" alt-text="Custom configuration with PLIST file"::: |
| 144 | + |
| 145 | +- These PLIST settings configure the following SSO Extension options: |
| 146 | + |
| 147 | + | Key | Type | Value | |
| 148 | + | --- | --- | --- | |
| 149 | + | **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).| |
| 150 | + | **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.| |
| 151 | + | **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. | |
| 152 | + |
| 153 | + > [!TIP] |
| 154 | + > For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options). |
| 155 | + |
| 156 | +6. Select the **Scope** tab. Specify the computers or devices that should be targeted to receive the SSO Extension MDM profile. |
| 157 | +7. Select **Save**. |
| 158 | + |
| 159 | +When the device checks in with the Jamf Pro service, it will receive this profile. |
| 160 | + |
| 161 | +## End user experience |
| 162 | + |
| 163 | +:::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/flow-chart-end-user.png" alt-text="End user flow chart when installing SSO app app extension on iOS/iPadOS and macOS devices in Jamf Pro."::: |
| 164 | + |
| 165 | +- If you're not deploying the Microsoft Authenticator or Company Portal app using Jamf Pro, then users must install these apps manually. Remember: |
| 166 | + - On iOS/iPadOS devices, users install the Microsoft Authenticator app. |
| 167 | + - On macOS devices, users install the Company Portal app. |
| 168 | + |
| 169 | + On Apple devices, Apple requires the SSO app extension and the app (Authenticator or Company Portal) be installed. **Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device.** |
| 170 | + |
| 171 | +- Users sign in to any supported app or website to bootstrap the extension. Bootstrap is the process of signing in for the first time, which sets up the extension. |
| 172 | + |
| 173 | + :::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/user-signs-in.png" alt-text="Users signs in to app or website to bootstrap the SSO app extension on iOS/iPadOS and macOS devices in Jamf Pro."::: |
| 174 | + |
| 175 | +- After users sign in successfully, the extension is automatically used to sign in to any other supported app or website. |
| 176 | + |
| 177 | +On macOS, users are prompted to opt in or out of SSO when they sign in to a work or school app. They can select **Don’t ask me again** to opt out of SSO and block future requests about it. |
| 178 | + |
| 179 | +Users can also manage their SSO preferences in the Company Portal app for macOS. To edit preferences, send them to the Company Portal menu bar > **Company Portal** > **Preferences** and tell them to select or deselect **Don’t ask me to sign in with single sign-on for this device**. |
| 180 | + |
| 181 | +## Next steps |
| 182 | + |
| 183 | +- For information about the Microsoft Enterprise SSO plug-in, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin). |
| 184 | + |
| 185 | +- For information from Apple on the single sign-on extension payload, see [Single Sign-On Extensions payload settings](https://support.apple.com/guide/mdm/single-sign-on-extensions-mdmfd9cdf845/web) (opens Apple's web site). |
0 commit comments