Skip to content

Commit 957b765

Browse files
authored
Merge pull request #109407 from mmacy/brandwe-shared-device-mode-109112
[MSAL] shared device mode + SSO plug-in
2 parents a91fd65 + 282314c commit 957b765

8 files changed

+433
-29
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5110,6 +5110,11 @@
51105110
"redirect_url": "/azure/active-directory/develop/msal-overview",
51115111
"redirect_document_id": true
51125112
},
5113+
{
5114+
"source_path": "articles/active-directory/develop/shared-device-mode.md",
5115+
"redirect_url": "/azure/active-directory/develop/msal-android-shared-devices",
5116+
"redirect_document_id": true
5117+
},
51135118
{
51145119
"source_path": "articles/azure-resource-manager/resource-group-authenticate-service-principal.md",
51155120
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",

articles/active-directory/develop/TOC.yml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -223,8 +223,12 @@
223223
href: scenario-mobile-app-configuration.md
224224
- name: Mobile platforms specific config
225225
items:
226+
- name: Microsoft Enterprise SSO plug-in for Apple devices
227+
href: apple-sso-plugin.md
226228
- name: Shared device mode for Android devices
227-
href: shared-device-mode.md
229+
href: msal-android-shared-devices.md
230+
- name: Shared device mode for iOS devices
231+
href: msal-ios-shared-devices.md
228232
- name: Xamarin Android
229233
href: msal-net-xamarin-android-considerations.md
230234
- name: System browser on Android
@@ -312,6 +316,17 @@
312316
href: msal-handling-exceptions.md
313317
- name: Logging
314318
href: msal-logging.md
319+
- name: Shared devices
320+
items:
321+
- name: Overview - shared devices
322+
href: msal-shared-devices.md
323+
displayName: shared device mode, firstline worker, frontline worker
324+
- name: Shared device mode for iOS devices
325+
href: msal-ios-shared-devices.md
326+
displayName: firstline worker, frontline worker
327+
- name: Shared device mode for Android devices
328+
href: msal-android-shared-devices.md
329+
displayName: firstline worker, frontline worker
315330
- name: Single sign-on
316331
displayName: SSO
317332
items:
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: Microsoft Enterprise SSO plug-in for Apple devices
3+
titleSuffix: Microsoft identity platform | Azure
4+
description: Learn about Microsoft's Azure Active Directory SSO plug-in for iOS and macOS devices.
5+
services: active-directory
6+
author: brandwe
7+
manager: CelesteDG
8+
9+
ms.service: active-directory
10+
ms.subservice: develop
11+
ms.topic: conceptual
12+
ms.workload: identity
13+
ms.date: 03/31/2020
14+
ms.author: brandwe
15+
ms.reviewer: brandwe
16+
ms.custom: aaddev
17+
---
18+
19+
# Microsoft Enterprise SSO plug-in for Apple devices (Preview)
20+
21+
> [!NOTE]
22+
> This feature is in public preview.
23+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
26+
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
27+
28+
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications.
29+
30+
Our first use of the Enterprise SSO plug-in is with our new [shared device mode](msal-ios-shared-devices.md) feature.
31+
32+
## Features
33+
34+
The Microsoft Enterprise SSO plug-in for Apple devices offers the following benefits:
35+
36+
- Provides SSO for Active Directory accounts across all applications that support Apple's Enterprise Single Sign-On feature.
37+
- Delivered automatically in the Microsoft Authenticator and can be enabled by any mobile device management (MDM) solution.
38+
39+
## Requirements
40+
41+
To use Microsoft Enterprise SSO plug-in for Apple devices:
42+
43+
- iOS 13.0 or higher must be installed on the device.
44+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications include the [Microsoft Authenticator app](../user-help/user-help-auth-app-overview.md).
45+
- Device must be MDM-enrolled (for example, with Microsoft Intune).
46+
- Configuration must be pushed to the device to enable the Microsoft Enterprise SSO plug-in for Apple devices on the device. This security constraint is required by Apple.
47+
48+
## Enable the SSO extension with mobile device management (MDM)
49+
50+
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator app](..//user-help/user-help-auth-app-overview.md), use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
51+
52+
Use the following parameters to configure the Microsoft Enterprise SSO plug-in for Apple devices:
53+
54+
- **Type**: Redirect
55+
- **Extension ID**: `com.microsoft.azureauthenticator.ssoextension`
56+
- **Team ID**: `SGGM6D27TK`
57+
- **URLs**:
58+
- `https://login.microsoftonline.com`
59+
- `https://login.windows.net`
60+
- `https://login.microsoft.com`
61+
- `https://sts.windows.net`
62+
- `https://login.partner.microsoftonline.cn`
63+
- `https://login.chinacloudapi.cn`
64+
- `https://login.microsoftonline.de`
65+
- `https://login.microsoftonline.us`
66+
- `https://login.usgovcloudapi.net`
67+
- `https://login-us.microsoftonline.com`
68+
69+
You can use Microsoft Intune as your MDM service to ease configuration of the Microsoft Enterprise SSO plug-in. For more information, see the [Intune configuration documentation](https://docs.microsoft.com/intune/configuration/ios-device-features-settings).
70+
71+
## Using the SSO extension in your application
72+
73+
The [Microsoft Authentication Library (MSAL) for Apple devices](https://github.com/AzureAD/microsoft-authentication-library-for-objc) version 1.1.0 and higher supports the Microsoft Enterprise SSO plug-in for Apple devices.
74+
75+
If you'd like to support shared device mode provided by the Microsoft Enterprise SSO plug-in for Apple devices, ensure your applications use the specified minimum required version of MSAL.
76+
77+
## Next steps
78+
79+
For more information about shared device mode on iOS, see [Shared device mode for iOS devices](msal-ios-shared-devices.md).

articles/active-directory/develop/shared-device-mode.md renamed to articles/active-directory/develop/msal-android-shared-devices.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,19 @@
11
---
2-
title: Shared device mode for Android devices | Azure
3-
description: Learn about shared device mode, which allows firstline workers to share an Android device
2+
title: Shared device mode for Android devices
3+
titleSuffix: Microsoft identity platform | Azure
4+
description: Learn how to enable shared device mode to allow Firstline Workers to share an Android device
45
services: active-directory
5-
documentationcenter: dev-center-name
66
author: mmacy
77
manager: CelesteDG
8+
89
ms.service: active-directory
910
ms.subservice: develop
10-
ms.devlang: na
1111
ms.topic: conceptual
12-
ms.tgt_pltfrm: na
1312
ms.workload: identity
14-
ms.date: 1/15/2020
13+
ms.date: 03/31/2020
1514
ms.author: marsma
16-
ms.reviwer: hahamil
17-
ms.custom: aaddev, identityplatformtop40
15+
ms.reviewer: hahamil
16+
ms.custom: aaddev, identitypla | Azuretformtop40
1817
---
1918

2019
# Shared device mode for Android devices
@@ -24,7 +23,7 @@ ms.custom: aaddev, identityplatformtop40
2423
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2524
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2625
27-
Firstline workers, such as retail associates, flight crew members, and field service workers, often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
26+
Firstline Workers such as retail associates, flight crew members, and field service workers often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
2827

2928
Shared device mode allows you to configure an Android device so that it can be easily shared by multiple employees. Employees can sign in and access customer information quickly. When they are finished with their shift or task, they can sign out of the device and it will be immediately ready for the next employee to use.
3029

@@ -33,14 +32,14 @@ Shared device mode also provides Microsoft identity backed management of the dev
3332
To create a shared device mode app, developers and cloud device admins work together:
3433

3534
- Developers write a single-account app (multiple-account apps are not supported in shared device mode), add `"shared_device_mode_supported": true` to the app's configuration, and write code to handle things like shared device sign-out.
36-
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#cloud-device-administrator) role can put a device into shared mode by using the [Authenticator app](https://docs.microsoft.com/azure/active-directory/user-help/user-help-auth-app-overview). You can configure the membership of your organizational roles in the Azure portal via:
35+
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](../users-groups-roles/directory-assign-admin-roles.md#cloud-device-administrator-permissions) role can put a device into shared mode by using the [Authenticator app](../user-help/user-help-auth-app-overview.md). You can configure the membership of your organizational roles in the Azure portal via:
3736
**Azure Active Directory** > **Roles and Administrators** > **Cloud Device Administrator**.
3837

3938
This article focuses primarily what developers should think about.
4039

4140
## Single vs multiple-account applications
4241

43-
Applications written using the Microsoft Authentication Library SDK (MSAL) can manage a single account or multiple accounts. For details, see [single-account mode or multiple-account mode](https://docs.microsoft.com/azure/active-directory/develop/single-multi-account). Microsoft identity platform features available to your app vary depending on whether the application is running in single-account mode or multiple-account mode.
42+
Applications written using the Microsoft Authentication Library SDK (MSAL) can manage a single account or multiple accounts. For details, see [single-account mode or multiple-account mode](single-multi-account.md). Microsoft identity platform features available to your app vary depending on whether the application is running in single-account mode or multiple-account mode.
4443

4544
**Shared device mode apps only work in single-account mode**.
4645

@@ -55,7 +54,7 @@ Your app can be built to support running on both personal devices and shared dev
5554

5655
You may also want your app to change its behavior depending on the type of device it is running on. Use `ISingleAccountPublicClientApplication.isSharedDevice()` to determine when to run in single-account mode.
5756

58-
There are two different interfaces that represent the type of device your application is on. When you request an application instance from MSALs application factory, the correct application object is provided automatically.
57+
There are two different interfaces that represent the type of device your application is on. When you request an application instance from MSAL's application factory, the correct application object is provided automatically.
5958

6059
The following object model illustrates the type of object you may receive and what it means in the context of a shared device:
6160

0 commit comments

Comments
 (0)