Skip to content

Commit 86bc721

Browse files
committed
SSO Extension Configuration with Jamf Pro
Added configuration doc and images to help Jamf Pro customers configure the SSO Extension with Jamf Pro. Many customers struggled to configure the SSO Extension settings properly in Jamf Pro, so an explicit doc should help.
1 parent 4ff2b0e commit 86bc721

6 files changed

Lines changed: 185 additions & 0 deletions

File tree

87.9 KB
Loading
439 KB
Loading
172 KB
Loading
115 KB
Loading
Loading
Lines changed: 185 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,185 @@
1+
---
2+
# required metadata
3+
4+
title: Microsoft Enterprise SSO plug-in in Jamf Pro
5+
description: Add or create a macOS device profile using the Microsoft Enterprise SSO plug-in in Jamf Pro.
6+
keywords:
7+
author: Michael Epping
8+
ms.author: miepping
9+
manager:
10+
ms.date: 03/9/2022
11+
ms.topic: how-to
12+
ms.service: microsoft-intune
13+
ms.subservice: configuration
14+
ms.localizationpriority: high
15+
ms.technology:
16+
17+
# optional metadata
18+
19+
#ROBOTS:
20+
#audience:
21+
22+
ms.reviewer: beflamm
23+
ms.suite: ems
24+
search.appverid: MET150
25+
#ms.tgt_pltfrm:
26+
ms.custom: intune-azure
27+
ms.collection: M365-identity-device-management
28+
---
29+
30+
# Use the Microsoft Enterprise SSO plug-in on iOS/iPadOS and macOS devices in Jamf Pro
31+
32+
The Microsoft Enterprise SSO plug-in (preview) provides single sign-on (SSO) to apps and websites that use Microsoft Azure Active Directory (AAD) for authentication, including Microsoft 365. This plug-in uses the Apple single sign on app extension framework. It reduces the number of authentication prompts users get when using devices managed by Mobile Device Management (MDM), including Jamf Pro.
33+
34+
Once set up, apps that support the Microsoft Authentication Library (MSAL) automatically take advantage of the Microsoft Enterprise SSO plug-in (preview). Apps that don't support MSAL can be allowed to use the extension. Just add the application bundle ID or prefix to the extension configuration.
35+
36+
For example, to allow a Microsoft app that doesn't support MSAL, add `com.microsoft.` to the **AppPrefixAllowList** property. Be careful with the apps you allow. They automatically use the user's credentials to authenticate.
37+
38+
For more information, see [Microsoft Enterprise SSO plug-in for Apple devices - apps that don't use MSAL](/azure/active-directory/develop/apple-sso-plugin#applications-that-dont-use-msal).
39+
40+
This feature applies to:
41+
42+
- iOS/iPadOS
43+
- macOS
44+
45+
This article shows how to deploy the Microsoft Enterprise SSO plug-in (preview) for Apple Devices with Jamf Pro.
46+
47+
> [!IMPORTANT]
48+
> The Microsoft Enterprise SSO plug-in for Apple Devices is in public preview. This preview version is provided without a service level agreement (SLA). It's not recommended to use in production. Certain features might not be supported or might have restricted behavior. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
49+
50+
## Prerequisites
51+
52+
To use the Microsoft Enterprise SSO plug-in for Apple devices:
53+
54+
- The device must support the plug-in:
55+
56+
- iOS/iPadOS 13.0 and newer
57+
- macOS 10.15 and newer
58+
59+
- On iOS/iPadOS 13.0 and newer devices, install the Microsoft Authenticator app.
60+
61+
The Microsoft Authenticator app can be installed manually by users, or by deploying the app through Jamf Pro. For information on how to install the Microsoft Authenticator app, see [Jamf Pro's documentation](https://docs.jamf.com/10.24.1/jamf-pro/administrator-guide/App_Store_Apps.html).
62+
63+
- On macOS 10.15 and newer devices, install the Company Portal app.
64+
65+
The Company Portal app can be installed manually by users, or by deploying the app through Jamf Pro. For a list of options on how to install the Company Portal app, see [Jamf Pro's documentation](https://docs.jamf.com/10.24.1/jamf-pro/administrator-guide/Managing_macOS_Installers.html).
66+
67+
> [!NOTE]
68+
> On Apple devices, Apple requires that the SSO app extension and the app (Authenticator or Company Portal) be installed. Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device. **[Jamf Pro and Intune integration for device compliance](../protect/conditional-access-integrate-jamf.md) is not required to use the SSO app extension.**
69+
70+
## Microsoft Enterprise SSO plug-in vs. Kerberos SSO extension
71+
72+
In Jamf Pro, when you use the SSO app extension, you use the **SSO** or **Kerberos** Payload Type for authentication. The SSO app extension is designed to improve the sign-in experience for apps and websites that use these authentication methods.
73+
74+
The Microsoft Enterprise SSO plug-in uses the **SSO** Payload Type with **Redirect** authentication. The SSO Redirect and Kerberos extension types can both be used on a device. Be sure to create separate device profiles.
75+
76+
To determine the correct SSO extension type for your scenario, use the following table:
77+
78+
---
79+
| Microsoft Enterprise SSO plug-in for Apple Devices | Single sign-on app extension with Kerberos |
80+
| --- | --- |
81+
| Uses the **SSO Redirect** SSO app extension type | Uses the **Kerberos** SSO app extension type|
82+
| Supports the following apps:<br/><br/>- Microsoft 365 <br/>- Apps, websites or services integrated with Azure AD | Supports the following apps:<br/><br/>- Apps, websites or services integrated with AD |
83+
84+
---
85+
86+
For more information on the single sign-on extension, see [Single sign-on app extension](device-features-configure.md#single-sign-on-app-extension).
87+
88+
## Create a single sign-on app extension configuration profile in Jamf Pro
89+
90+
In the Jamf Pro portal, you create a Computer or Device configuration profile. This profile includes the settings to configure the SSO app extension on devices.
91+
92+
1. Sign in to the Jamf Pro portal.
93+
2. Select **Computers** > **Configuration profiles** > **New** to create a macOS profile or select **Devices** > **Configuration profiles** > **New** to create an iOS/iPadOS profile.
94+
95+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/jamf-pro-configuration-profiles.png" alt-text="Navigation to Jamf Pro portal configuration profiles for macOS":::
96+
97+
3. Scroll down in the Options column and select **Single Sign-On Extensions** > **Add**.
98+
99+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-creation.png" alt-text="Select configuration profiles SSO option and click add":::
100+
101+
4. Enter the following properties:
102+
103+
- **Payload Type**: SSO
104+
- **Extension Identifier**:
105+
- **macOS**: com.microsoft.CompanyPortalMac.ssoextension
106+
- **iOS/iPadOS**: com.microsoft.azureauthenticator.ssoextension
107+
- **Team Identifier**:
108+
- **macOS**: UBF8T346G9
109+
- **iOS/iPadOS**: No value is needed, leave the field blank.
110+
- **Sign-On Type**: Redirect
111+
- **URLs**:
112+
- `https://login.microsoftonline.com`
113+
- `https://login.microsoft.com`
114+
- `https://sts.windows.net`
115+
- `https://login.partner.microsoftonline.cn`
116+
- `https://login.chinacloudapi.cn`
117+
- `https://login.microsoftonline.de`
118+
- `https://login.microsoftonline.us`
119+
- `https://login.usgovcloudapi.net`
120+
- `https://login-us.microsoftonline.com`
121+
122+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-1.png" alt-text="Basic configuration settings part 1":::
123+
124+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-2.png" alt-text="Basic configuration settings part 2":::
125+
126+
5. In **Custom Configuration** you will define other required properties. Jamf Pro requires that these properties are configured via an uploaded PLIST file. The full list of configurable properties is covered in the [Azure AD Apple SSO Extension documentation](/azure/active-directory/develop/apple-sso-plugin#manual-configuration-for-other-mdm-services). This is a recommended PLIST file that will meet the needs of most organizations:
127+
128+
```xml
129+
<?xml version="1.0" encoding="UTF-8"?>
130+
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
131+
<plist version="1.0">
132+
<dict>
133+
<key>AppPrefixAllowList</key>
134+
<string>com.microsoft.,com.apple.</string>
135+
<key>browser_sso_interaction_enabled</key>
136+
<integer>1</integer>
137+
<key>disable_explicit_app_prompt</key>
138+
<integer>1</integer>
139+
</dict>
140+
</plist>
141+
```
142+
143+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-custom-configuration-plist.png" alt-text="Custom configuration with PLIST file":::
144+
145+
- These PLIST settings configure the following SSO Extension options:
146+
147+
| Key | Type | Value |
148+
| --- | --- | --- |
149+
| **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).|
150+
| **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.|
151+
| **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. |
152+
153+
> [!TIP]
154+
> For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options).
155+
156+
6. Select the **Scope** tab. Specify the computers or devices that should be targeted to receive the SSO Extension MDM profile.
157+
7. Select **Save**.
158+
159+
When the device checks in with the Jamf Pro service, it will receive this profile.
160+
161+
## End user experience
162+
163+
:::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/flow-chart-end-user.png" alt-text="End user flow chart when installing SSO app app extension on iOS/iPadOS and macOS devices in Jamf Pro.":::
164+
165+
- If you're not deploying the Microsoft Authenticator or Company Portal app using Jamf Pro, then users must install these apps manually. Remember:
166+
- On iOS/iPadOS devices, users install the Microsoft Authenticator app.
167+
- On macOS devices, users install the Company Portal app.
168+
169+
On Apple devices, Apple requires the SSO app extension and the app (Authenticator or Company Portal) be installed. **Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device.**
170+
171+
- Users sign in to any supported app or website to bootstrap the extension. Bootstrap is the process of signing in for the first time, which sets up the extension.
172+
173+
:::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/user-signs-in.png" alt-text="Users signs in to app or website to bootstrap the SSO app extension on iOS/iPadOS and macOS devices in Jamf Pro.":::
174+
175+
- After users sign in successfully, the extension is automatically used to sign in to any other supported app or website.
176+
177+
On macOS, users are prompted to opt in or out of SSO when they sign in to a work or school app. They can select **Don’t ask me again** to opt out of SSO and block future requests about it.
178+
179+
Users can also manage their SSO preferences in the Company Portal app for macOS. To edit preferences, send them to the Company Portal menu bar > **Company Portal** > **Preferences** and tell them to select or deselect **Don’t ask me to sign in with single sign-on for this device**.
180+
181+
## Next steps
182+
183+
- For information about the Microsoft Enterprise SSO plug-in, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin).
184+
185+
- For information from Apple on the single sign-on extension payload, see [Single Sign-On Extensions payload settings](https://support.apple.com/guide/mdm/single-sign-on-extensions-mdmfd9cdf845/web) (opens Apple's web site).

0 commit comments

Comments
 (0)