Use the Microsoft Enterprise SSO plug-in on iOS/iPadOS devices
Article
The Microsoft Enterprise SSO plug-in is a feature in Microsoft Entra ID that provides single sign-on (SSO) features for Apple devices. This plug-in uses the Apple single sign-on app extension framework.
For iOS/iPadOS devices, the Enterprise SSO plug-in includes the SSO app extension.
The SSO app extension provides single sign-on to apps and websites that use Microsoft Entra ID for authentication, including Microsoft 365 apps. It reduces the number of authentication prompts users get when using devices managed by Mobile Device Management (MDM), including any MDM that supports configuring SSO profiles.
This article shows how to create an SSO app extension configuration policy for iOS/iPadOS Apple devices with Intune, Jamf Pro, and other MDM solutions.
App support
For your apps to use the Microsoft Enterprise SSO plug-in, you have two options:
Option 1 - MSAL: Apps that support the Microsoft Authentication Library (MSAL) automatically take advantage of the Microsoft Enterprise SSO plug-in. For example, Microsoft 365 apps support MSAL. So, they automatically use the plug-in.
If your organization creates its own apps, then your app developer can add a dependency to the MSAL. This dependency enables your app to use the Microsoft Enterprise SSO plug-in.
Option 2 - AllowList: Apps that don't support or weren't developed with MSAL can use the SSO app extension. These apps include browsers like Safari and apps that use Safari web view APIs.
For these non-MSAL apps, add the application bundle ID or prefix to the extension configuration in your Intune SSO app extension policy (in this article).
For example, to allow a Microsoft app that doesn't support MSAL, add com.microsoft. to the AppPrefixAllowList property in your Intune policy. Be careful with the apps you allow, they can bypass interactive sign-in prompts for the signed in user.
The Microsoft Authenticator app must be installed on the device.
Users can install the Microsoft Authenticator app manually. Or, admins can deploy the app using Intune. For information on how to install the Microsoft Authenticator app, go to Manage Apple volume-purchased apps.
The Microsoft Authenticator app must be installed on the device.
Users can install the Microsoft Authenticator app manually. Or, admins can deploy the app using Jamf Pro. For a list of options on how to install the Microsoft Authenticator app, go to Managing macOS installers using Jamf Pro (opens Jamf Pro's web site).
The Microsoft Authenticator app must be installed on the device. Users can install the Microsoft Authenticator app manually. Or, admins can deploy the app using an MDM policy.
On iOS/iPadOS devices, Apple requires that the SSO app extension and the Microsoft Authenticator app be installed. Users don't need to use or configure the Microsoft Authenticator app, it just needs to be installed on the device.
Microsoft Enterprise SSO plug-in vs. Kerberos SSO extension
When you use the SSO app extension, you use the SSO or Kerberos Payload Type for authentication. The SSO app extension is designed to improve the sign-in experience for apps and websites that use these authentication methods.
The Microsoft Enterprise SSO plug-in uses the SSO Payload Type with Redirect authentication. The SSO Redirect and Kerberos extension types can both be used on a device at the same time. Be sure to create separate device profiles for each extension type you plan to use on your devices.
To determine the correct SSO extension type for your scenario, use the following table:
Microsoft Enterprise SSO plug-in for Apple Devices
Single sign-on app extension with Kerberos
Uses the Microsoft Entra ID SSO app extension type
Uses the Kerberos SSO app extension type
Supports the following apps: - Microsoft 365 - Apps, websites or services integrated with Microsoft Entra ID
Supports the following apps: - Apps, websites or services integrated with AD
In the Microsoft Intune admin center, create a device configuration profile. This profile includes the settings to configure the SSO app extension on devices.
Name: Enter a descriptive name for the policy. Name your policies so you can easily identify them later. For example, a good policy name is iOS: SSO app extension.
Description: Enter a description for the policy. This setting is optional, but recommended.
Select Next.
In Configuration settings, select Single sign-on app extension, and configure the following properties:
SSO app extension type: Select Microsoft Entra ID.
Enable shared device mode:
Not configured: Intune doesn't change or update this setting.
For most scenarios, including Shared iPad, personal devices, and devices with or without user affinity, select this option.
Yes: Select this option only if the targeted devices are using Microsoft Entra shared device mode. For more information, go to Shared device mode overview.
App bundle ID: Enter a list of bundle IDs for apps that don't support MSAL and are allowed to use SSO. For more information, go to Applications that don't use MSAL.
Additional configuration: To customize the end user experience, you can add the following properties. These properties are the default values used by the Microsoft SSO Extension, but they can be customized for your organization needs:
Key
Type
Description
AppPrefixAllowList
String
Recommended value: com.apple.
Enter a list of prefixes for apps that don't support MSAL and are allowed to use SSO. For example, enter com.microsoft.,com.apple. to allow all Microsoft and Apple apps.
When set to 1, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.
disable_explicit_app_prompt
Integer
Recommended value: 1
Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps.
When you're done configuring the settings and are allowing Microsoft & Apple apps, then the settings look similar to the following values in your Intune configuration profile:
Continue creating the profile, and assign the profile to the users or groups that will receive these settings. For the specific steps, go to Create the profile.
When the device checks in with the Intune service, it receives this profile. For more information, go to Policy refresh intervals.
To check that the profile deployed correctly, in the Intune admin center, go to Devices > Manage devices > Configuration > select the profile you created and generate a report:
In the Jamf Pro portal, you create a Computer or Device configuration profile. This profile includes the settings to configure the SSO app extension on devices.
Sign in to the Jamf Pro portal.
To create an iOS/iPadOS profile, select Devices > Configuration Profiles > New:
In Name, enter a descriptive name for the policy. Name your policies so you can easily identify them later. For example, a good policy name is: iOS/iPadOS: Microsoft Enterprise SSO plug-in.
In the Options column, scroll down and select Single Sign-On Extensions > Add:
Enter the following properties:
Payload Type: Select SSO.
Extension Identifier: Enter com.microsoft.azureauthenticator.ssoextension.
Team Identifier: No value is needed. Leave the field blank.
Sign-On Type: Select Redirect.
URLs: Enter the following URLs, one at a time:
https://login.microsoftonline.com
https://login.microsoft.com
https://sts.windows.net
https://login.partner.microsoftonline.cn
https://login.chinacloudapi.cn
https://login.microsoftonline.us
https://login-us.microsoftonline.com
In Custom Configuration, you define other required properties. Jamf Pro requires that these properties are configured using an uploaded PLIST file. To see the full list of configurable properties, go to Microsoft Enterprise SSO plug-in for Apple devices documentation.
The following example is a recommended PLIST file that meets the needs of most organizations:
These PLIST settings configure the following SSO Extension options. These properties are the default values used by the Microsoft SSO Extension, but they can be customized for your organization needs:
Enter a list of prefixes for apps that don't support MSAL and are allowed to use SSO. For example, enter com.microsoft.,com.apple.,com.jamf.,com.jamfsoftware. to allow all Microsoft, Apple, and Jamf Pro apps.
Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps.
Optionally, you can configure other properties. These properties are the default values used by the Microsoft SSO Extension, but they can be customized for your organization needs:
Key
Type
Description
AppPrefixAllowList
String
Recommended value: com.apple.
Enter a list of prefixes for apps that don't support MSAL and are allowed to use SSO. For example, enter com.microsoft.,com.apple. to allow all Microsoft and Apple apps.
When set to 1, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.
disable_explicit_app_prompt
Integer
Recommended value: 1
Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps.
Assign the new policy to the devices that should be targeted to receive the SSO Extension MDM profile.
When the device checks in with the MDM service, it receives this profile.
End user experience
If you're not deploying the Microsoft Authenticator app using an app policy, then users must install it manually. Users don't need to use the Authenticator app, it just needs to be installed on the device.
Users sign in to any supported app or website to bootstrap the extension. Bootstrap is the process of signing in for the first time, which sets up the extension.
After users sign in successfully, the extension is automatically used to sign in to any other supported app or website.
You can test single sign-on by opening Safari in private mode (opens Apple's web site) and opening the https://portal.office.com site. No username and password will be required.
Deploying and monitoring enterprise applications to Azure solutions can ensure security. Explore how to deploy on-premises and cloud based apps to users.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.