Single SignOn and Mobile Devices

Jonathan Berg 6 Reputation points
2025-05-01T14:18:01.7866667+00:00

I'm not sure if this is the right place to access this type of question. I used to access questions under technet when that was till around. So I apologize if this isn't the correct place.

We are in the process of migrating to M365 from our OnPremise AD. We plan on staying Hybrid for awhile. We currently have our domain Federated for SSO with our ADFS servers. During our testing we discovered that since turning on Federated, Apple iOS Mobile Devices we have in inTune that use the Native Mail App do require a password. Well, that presents an issue in opening up ADFS outside of the 365 cloud because the federated option automatically redirects to our ADFS signon page. I have 3 questions to ask about this.

  1. With MFA being enforced, what are people doing for mobile devices such as Apple/Android to avoid dual auth on Mobile Devices?
  2. Is there any option that can be setup in M365 that when it recognizes a mobile device like through conditional access, that it can login with M365 instead of redirecting to use Adfs?
  3. Is seamless SSO an option that since Mobile Devices aren't domain joined that when their in inTune will that allow the Native Mail App password to be used for signon?

I'm just trying to figure out the best solution that not only encompasses SSO for our on-premise systems, but also the mobile devices as well.

Microsoft Entra External ID
Microsoft Entra External ID
A modern identity solution for securing access to customer, citizen and partner-facing apps and services. It is the converged platform of Azure AD External Identities B2B and B2C. Replaces Azure Active Directory External Identities.
3,176 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Jyotishree Moharana 1,105 Reputation points Microsoft External Staff Moderator
    2025-05-05T15:40:40.1+00:00

    Hello @Jonathan Berg,

    To streamline the process of MFA in mobile devices it is advised to use Modern Authentication as it works better with MFA and CA policies. Migrating from ADFS to Entra ID Authentication will also help in utilizing Conditional Access policies natively. It is also recommended to utilize Outlook mobile instead of the native iOS/Android mail app. Outlook supports modern auth and conditional access policies better than native apps this would help avoiding the dual prompts.

    For the second part as your domain is federated with ADFS, the authentication is redirected to ADFS by default. Microsoft 365 uses domain federation settings to determine whether to use ADFS or Entra ID. It would not be possible to selectively divert the redirection for mobile phones or some services. It can be considered to move towards Managed environment where the authentication will be handled by Entra ID and removes ADFS dependency.

    Seamless SSO only works for domain-joined Windows clients on corporate networks (via Kerberos), so mobile devices won’t benefit from Seamless SSO directly. To achieve slightly better experience on mobile phone you can use Device enrollment and compliance policies in Intune and combine with Conditional access policies. Moving towards modern auth and device policies will help achieve seamless like experience on mobile phones as MFA prompts will be minimum and refresh tokens would be used for future logins.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.