You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/apple-sso-plugin.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,17 +23,17 @@ ms.custom: aaddev
23
23
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24
24
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25
25
26
-
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory-joined accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
26
+
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
27
27
28
-
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications. The list of products and applications that support the Enterprise SSO plug-in in the future will be expanded in the future.
28
+
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications. The list of products and applications that support the Enterprise SSO plug-in will be expanded in the future.
29
29
30
-
Our first use of the Enterprise SSO plug-in is with our new [Shared Device Mode](msal-ios-shared-devices.md) product feature.
30
+
Our first use of the Enterprise SSO plug-in is with our new [shared device mode](msal-ios-shared-devices.md) feature.
31
31
32
32
## Features
33
33
34
34
The Microsoft Enterprise SSO plug-in for Apple devices offers the following benefits:
35
35
36
-
- Provides seamless SSO for Active Directory-joined accounts across all applications that support Apple's Enterprise Single Sign-On feature.
36
+
- Provides seamless SSO for Active Directory accounts across all applications that support Apple's Enterprise Single Sign-On feature.
37
37
- Delivered automatically in the Microsoft Authenticator and can be enabled by any mobile device management (MDM) solution.
38
38
39
39
Planned but not yet available in this preview release:
@@ -42,18 +42,18 @@ Planned but not yet available in this preview release:
42
42
43
43
## Requirements
44
44
45
-
To use Microsoft Enterprise SSO plug-in for Apple devices, devices must meet the following requirements:
45
+
To use Microsoft Enterprise SSO plug-in for Apple devices:
46
46
47
47
- iOS 13.0 or higher must be installed on the device.
48
-
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, this includes the [Microsoft Authenticator](../user-help/user-help-auth-app-overview.md) app.
49
-
- Device must be MDM-enrolled (for example, Microsoft Intune).
48
+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, this includes the [Microsoft Authenticator app](../user-help/user-help-auth-app-overview.md).
49
+
- Device must be MDM-enrolled (for example, with Microsoft Intune).
50
50
- Configuration must be pushed to the device to enable the Microsoft Enterprise SSO plug-in for Apple devices on the device. This security constraint is required by Apple.
51
51
52
52
## Enable the SSO extension with mobile device management (MDM)
53
53
54
-
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator](..//user-help/user-help-auth-app-overview.md) app, use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
54
+
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator app](..//user-help/user-help-auth-app-overview.md), use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
55
55
56
-
Use the following parameters to configure the Microsoft Enterprise SSO plug-in:
56
+
Use the following parameters to configure the Microsoft Enterprise SSO plug-in for Apple devices:
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24
24
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25
25
26
-
Firstline Workers, such as retail associates, flight crew members, and field service workers, often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
26
+
Firstline Workers such as retail associates, flight crew members, and field service workers often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
27
27
28
28
Shared device mode allows you to configure an Android device so that it can be easily shared by multiple employees. Employees can sign in and access customer information quickly. When they are finished with their shift or task, they can sign out of the device and it will be immediately ready for the next employee to use.
29
29
@@ -32,7 +32,7 @@ Shared device mode also provides Microsoft identity backed management of the dev
32
32
To create a shared device mode app, developers and cloud device admins work together:
33
33
34
34
- Developers write a single-account app (multiple-account apps are not supported in shared device mode), add `"shared_device_mode_supported": true` to the app's configuration, and write code to handle things like shared device sign-out.
35
-
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](../users-groups-roles/directory-assign-admin-roles#cloud-device-administrator.md) role can put a device into shared mode by using the [Authenticator app](../user-help/user-help-auth-app-overview.md). You can configure the membership of your organizational roles in the Azure portal via:
35
+
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](../users-groups-roles/directory-assign-admin-roles.md#cloud-device-administrator.md) role can put a device into shared mode by using the [Authenticator app](../user-help/user-help-auth-app-overview.md). You can configure the membership of your organizational roles in the Azure portal via:
36
36
**Azure Active Directory** > **Roles and Administrators** > **Cloud Device Administrator**.
37
37
38
38
This article focuses primarily what developers should think about.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-ios-shared-devices.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.reviewer: brandwe
16
16
ms.custom: aaddev
17
17
---
18
18
19
-
# Supporting shared device mode for iOS
19
+
# Shared device mode for iOS devices
20
20
21
21
> [!NOTE]
22
22
> This feature is in public preview.
@@ -177,12 +177,10 @@ The following code removes the signed-in account and clears cached tokens from n
177
177
178
178
#### Clear browser state
179
179
180
-
The [Microsoft Enterprise SSO plug-in for Apple devices](apple-sso-plugin.md)automatically adds and removes credentials to the Safari browser on the Shared Device. We recommend you rely on this to clear your browser state.
180
+
In this public preview version, the [Microsoft Enterprise SSO plug-in for Apple devices](apple-sso-plugin.md)clears state only for applications. It does not clear state on the Safari browser. We recommend you manually clear browser session to ensure no traces of user state are left behind. You can use the optional `signoutFromBrowser` property shown below to clear any cookies. This will cause the browser to briefly launch on the device. Microsoft plans to resolve this issue prior to general availability (GA) of this feature.
181
181
182
-
> [!NOTE]
183
-
> Step Below Required For Public Preview Only
184
-
>
185
-
> For the moment the Microsoft Enterprise SSO plug-in for Apple devices only clears state on applications. It does not clear state on the Safari browser. We recommend you manually clear browser session to ensure no traces of user state are left behind. You can use the optional `signoutFromBrowser` property shown below to clear any cookies. This will cause the browser to briefly launch on the device. We expect this to be fixed soon and will update documentation when browsers clear state on sign-out automatically.
182
+
> [!TIP]
183
+
> In a future version this feature, the Microsoft Enterprise SSO plug-in for Apple devices will automatically add credentials to and remove them from the Safari browser on the shared device. Upon release of this feature, we recommend you rely on this to clear your browser state.
0 commit comments