You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Microsoft Enterprise SSO plug-in for Apple devices
3
+
titleSuffix: Microsoft identity platform | Azure
4
+
description: Learn about Microsoft's Azure Active Directory SSO plug-in for iOS and macOS devices.
5
+
services: active-directory
6
+
author: brandwe
7
+
manager: CelesteDG
8
+
9
+
ms.service: active-directory
10
+
ms.subservice: develop
11
+
ms.topic: conceptual
12
+
ms.workload: identity
13
+
ms.date: 03/31/2020
14
+
ms.author: brandwe
15
+
ms.reviewer: brandwe
16
+
ms.custom: aaddev
17
+
---
18
+
19
+
# Microsoft Enterprise SSO plug-in for Apple devices (Preview)
20
+
21
+
> [!NOTE]
22
+
> This feature is in public preview.
23
+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25
+
26
+
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
27
+
28
+
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications.
29
+
30
+
Our first use of the Enterprise SSO plug-in is with our new [shared device mode](msal-ios-shared-devices.md) feature.
31
+
32
+
## Features
33
+
34
+
The Microsoft Enterprise SSO plug-in for Apple devices offers the following benefits:
35
+
36
+
- Provides SSO for Active Directory accounts across all applications that support Apple's Enterprise Single Sign-On feature.
37
+
- Delivered automatically in the Microsoft Authenticator and can be enabled by any mobile device management (MDM) solution.
38
+
39
+
## Requirements
40
+
41
+
To use Microsoft Enterprise SSO plug-in for Apple devices:
42
+
43
+
- iOS 13.0 or higher must be installed on the device.
44
+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications include the [Microsoft Authenticator app](../user-help/user-help-auth-app-overview.md).
45
+
- Device must be MDM-enrolled (for example, with Microsoft Intune).
46
+
- Configuration must be pushed to the device to enable the Microsoft Enterprise SSO plug-in for Apple devices on the device. This security constraint is required by Apple.
47
+
48
+
## Enable the SSO extension with mobile device management (MDM)
49
+
50
+
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator app](..//user-help/user-help-auth-app-overview.md), use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
51
+
52
+
Use the following parameters to configure the Microsoft Enterprise SSO plug-in for Apple devices:
You can use Microsoft Intune as your MDM service to ease configuration of the Microsoft Enterprise SSO plug-in. For more information, see the [Intune configuration documentation](https://docs.microsoft.com/intune/configuration/ios-device-features-settings).
70
+
71
+
## Using the SSO extension in your application
72
+
73
+
The [Microsoft Authentication Library (MSAL) for Apple devices](https://github.com/AzureAD/microsoft-authentication-library-for-objc) version 1.1.0 and higher supports the Microsoft Enterprise SSO plug-in for Apple devices.
74
+
75
+
If you'd like to support shared device mode provided by the Microsoft Enterprise SSO plug-in for Apple devices, ensure your applications use the specified minimum required version of MSAL.
76
+
77
+
## Next steps
78
+
79
+
For more information about shared device mode on iOS, see [Shared device mode for iOS devices](msal-ios-shared-devices.md).
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25
24
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26
25
27
-
Firstline workers, such as retail associates, flight crew members, and field service workers, often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
26
+
Firstline Workers such as retail associates, flight crew members, and field service workers often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
28
27
29
28
Shared device mode allows you to configure an Android device so that it can be easily shared by multiple employees. Employees can sign in and access customer information quickly. When they are finished with their shift or task, they can sign out of the device and it will be immediately ready for the next employee to use.
30
29
@@ -33,14 +32,14 @@ Shared device mode also provides Microsoft identity backed management of the dev
33
32
To create a shared device mode app, developers and cloud device admins work together:
34
33
35
34
- Developers write a single-account app (multiple-account apps are not supported in shared device mode), add `"shared_device_mode_supported": true` to the app's configuration, and write code to handle things like shared device sign-out.
36
-
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#cloud-device-administrator) role can put a device into shared mode by using the [Authenticator app](https://docs.microsoft.com/azure/active-directory/user-help/user-help-auth-app-overview). You can configure the membership of your organizational roles in the Azure portal via:
35
+
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](../users-groups-roles/directory-assign-admin-roles.md#cloud-device-administrator-permissions) role can put a device into shared mode by using the [Authenticator app](../user-help/user-help-auth-app-overview.md). You can configure the membership of your organizational roles in the Azure portal via:
37
36
**Azure Active Directory** > **Roles and Administrators** > **Cloud Device Administrator**.
38
37
39
38
This article focuses primarily what developers should think about.
40
39
41
40
## Single vs multiple-account applications
42
41
43
-
Applications written using the Microsoft Authentication Library SDK (MSAL) can manage a single account or multiple accounts. For details, see [single-account mode or multiple-account mode](https://docs.microsoft.com/azure/active-directory/develop/single-multi-account). Microsoft identity platform features available to your app vary depending on whether the application is running in single-account mode or multiple-account mode.
42
+
Applications written using the Microsoft Authentication Library SDK (MSAL) can manage a single account or multiple accounts. For details, see [single-account mode or multiple-account mode](single-multi-account.md). Microsoft identity platform features available to your app vary depending on whether the application is running in single-account mode or multiple-account mode.
44
43
45
44
**Shared device mode apps only work in single-account mode**.
46
45
@@ -55,7 +54,7 @@ Your app can be built to support running on both personal devices and shared dev
55
54
56
55
You may also want your app to change its behavior depending on the type of device it is running on. Use `ISingleAccountPublicClientApplication.isSharedDevice()` to determine when to run in single-account mode.
57
56
58
-
There are two different interfaces that represent the type of device your application is on. When you request an application instance from MSAL’s application factory, the correct application object is provided automatically.
57
+
There are two different interfaces that represent the type of device your application is on. When you request an application instance from MSAL's application factory, the correct application object is provided automatically.
59
58
60
59
The following object model illustrates the type of object you may receive and what it means in the context of a shared device:
0 commit comments