Hi Josh, unfortunately there’s no official way to completely bypass Azure AD and MFA for a Power App in kiosk mode - access tokens still expire daily. You can, however, drastically reduce prompts:
-Intune Shared iPad: Enroll the iPad as a “Shared iPad for Business” and deploy the Power App in kiosk mode so it’s marked compliant.
-Conditional Access: Target your app and device group with a policy that skips MFA for compliant devices and extends the sign‑in frequency (e.g. every 14 days or more).
-Service Account: Use a dedicated service account (with MFA disabled) and save its credentials in the Power Apps Player so you’re not re‑authenticating each morning.
That setup lets the app run unattended while keeping your environment secure