Skip to content

Commit e741365

Browse files
authored
Merge pull request #6104 from smithre4/smithre4-working
APP article updates
2 parents 88d034e + b73a0cd commit e741365

3 files changed

Lines changed: 12 additions & 5 deletions

File tree

memdocs/intune/apps/app-protection-framework.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 10/05/2021
11+
ms.date: 11/16/2021
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -218,7 +218,6 @@ The policy settings enforced in level 3 include all the policy settings recommen
218218

219219
| Setting | Setting description | Value / Action | Platform | Notes |
220220
|----------------------------|--------------------------------------|-------------------|---------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
221-
| Device conditions | Min OS version | *Format: Major.Minor<br> Example: 9.0* / Block access | Android | Microsoft recommends configuring the minimum Android major version to match the supported Android versions for Microsoft apps. OEMs and devices adhering to Android Enterprise recommended requirements must support the current shipping release + one letter upgrade. Currently, Android recommends Android 9.0 and later for knowledge workers. See [Android Enterprise Recommended requirements](https://www.android.com/enterprise/recommended/requirements/) for Android's latest recommendations |
222221
| Device conditions | Jailbroken/rooted devices | N/A / Wipe data | iOS/iPadOS, Android | |
223222
| Device conditions | Max allowed threat level | Secured / Block access | iOS/iPadOS, Android | <p>Unenrolled devices can be inspected for threats using Mobile Threat Defense. For more information, see [Mobile Threat Defense for unenrolled devices](../protect/mtd-enable-unenrolled-devices.md). </p><p> If the device is enrolled, this setting can be skipped in favor of deploying Mobile Threat Defense for enrolled devices. For more information, see [Mobile Threat Defense for enrolled devices](../protect/mtd-device-compliance-policy-create.md).</p> |
224223
| Device conditions | Max OS version | *Format: Major.Minor<br> Example: 11.0* / Block access | Android | Microsoft recommends configuring the maximum Android major version to ensure beta or unsupported versions of the operating system are not used. See [Android Enterprise Recommended requirements](https://www.android.com/enterprise/recommended/requirements/) for Android's latest recommendations |

memdocs/intune/apps/manage-microsoft-edge.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 07/19/2021
11+
ms.date: 11/17/2021
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -227,6 +227,14 @@ By default, users have the My Apps bookmark configured within the organization f
227227

228228
Edge for iOS and Android offers organizations several options for managing the app's behavior.
229229

230+
#### Azure AD password single sign-on
231+
232+
The Azure AD Password single sign-on (SSO) functionality offered by Azure Active Directory brings user access management to web applications that don't support identity federation. By default, Edge for iOS and Android does not perform SSO with the Azure AD credentials. For more information, see [Add password-based single sign-on to an application](/azure/active-directory/manage-apps/configure-password-single-sign-on-non-gallery-applications).
233+
234+
| Key | Value |
235+
|---------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
236+
| com.microsoft.intune.mam.managedbrowser.PasswordSSO | **true** Azure AD Password SSO is enabled<br>**false** (default) Azure AD Password SSO is disabled |
237+
230238
#### Default protocol handler
231239

232240
By default, Edge for iOS and Android uses the HTTPS protocol handler when the user doesn't specify the protocol in the URL. Generally, this is considered a best practice, but can be disabled.

memdocs/intune/developer/app-wrapper-prepare-android.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 07/26/2021
10+
ms.date: 11/11/2021
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer
@@ -49,7 +49,7 @@ Before running the tool, review [Security considerations for running the App Wra
4949

5050
- It cannot be encrypted.
5151
- It must not have previously been wrapped by the Intune App Wrapping Tool.
52-
- It must be written for Android 4.0 or later.
52+
- It must be written for Android 9.0 or later.
5353

5454
> [!NOTE]
5555
> If your input app is an Android App Bundle (.aab), you will need to convert it to an APK before using the Intune App Wrapping Tool. For details, see [Convert Android App Bundle (AAB) to APK](#convert-android-app-bundle-aab-to-apk). As of August 2021, [new private apps can still be published to the Google Play Store as APKs](https://support.google.com/googleplay/work/answer/6145139?hl=en).

0 commit comments

Comments
 (0)