Skip to content

Commit fa4bdac

Browse files
committed
fix NOTE box (now a TIP)
1 parent e1bb5a9 commit fa4bdac

File tree

3 files changed

+16
-18
lines changed

3 files changed

+16
-18
lines changed

articles/active-directory/develop/apple-sso-plugin.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,17 +23,17 @@ ms.custom: aaddev
2323
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2424
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2525
26-
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory-joined accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
26+
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
2727

28-
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications. The list of products and applications that support the Enterprise SSO plug-in in the future will be expanded in the future.
28+
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications. The list of products and applications that support the Enterprise SSO plug-in will be expanded in the future.
2929

30-
Our first use of the Enterprise SSO plug-in is with our new [Shared Device Mode](msal-ios-shared-devices.md) product feature.
30+
Our first use of the Enterprise SSO plug-in is with our new [shared device mode](msal-ios-shared-devices.md) feature.
3131

3232
## Features
3333

3434
The Microsoft Enterprise SSO plug-in for Apple devices offers the following benefits:
3535

36-
- Provides seamless SSO for Active Directory-joined accounts across all applications that support Apple's Enterprise Single Sign-On feature.
36+
- Provides seamless SSO for Active Directory accounts across all applications that support Apple's Enterprise Single Sign-On feature.
3737
- Delivered automatically in the Microsoft Authenticator and can be enabled by any mobile device management (MDM) solution.
3838

3939
Planned but not yet available in this preview release:
@@ -42,18 +42,18 @@ Planned but not yet available in this preview release:
4242

4343
## Requirements
4444

45-
To use Microsoft Enterprise SSO plug-in for Apple devices, devices must meet the following requirements:
45+
To use Microsoft Enterprise SSO plug-in for Apple devices :
4646

4747
- iOS 13.0 or higher must be installed on the device.
48-
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, this includes the [Microsoft Authenticator](../user-help/user-help-auth-app-overview.md) app.
49-
- Device must be MDM-enrolled (for example, Microsoft Intune).
48+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, this includes the [Microsoft Authenticator app](../user-help/user-help-auth-app-overview.md).
49+
- Device must be MDM-enrolled (for example, with Microsoft Intune).
5050
- Configuration must be pushed to the device to enable the Microsoft Enterprise SSO plug-in for Apple devices on the device. This security constraint is required by Apple.
5151

5252
## Enable the SSO extension with mobile device management (MDM)
5353

54-
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator](..//user-help/user-help-auth-app-overview.md) app, use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
54+
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator app](..//user-help/user-help-auth-app-overview.md), use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
5555

56-
Use the following parameters to configure the Microsoft Enterprise SSO plug-in:
56+
Use the following parameters to configure the Microsoft Enterprise SSO plug-in for Apple devices:
5757

5858
- **Type**: Redirect
5959
- **Extension ID**: `com.microsoft.azureauthenticator.ssoextension`
@@ -80,4 +80,4 @@ Using MSAL is all you need to experiment with the Enterprise SSO plug-in.
8080

8181
## Next steps
8282

83-
For more information about shared device mode, see [Overview of Shared Device Mode](msal-shared-devices.md).
83+
For more information about shared device mode on iOS, see [Shared device mode for iOS devices](msal-ios-shared-devices.md).

articles/active-directory/develop/msal-android-shared-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom: aaddev, identityplatformtop40
2323
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2424
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2525
26-
Firstline Workers, such as retail associates, flight crew members, and field service workers, often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
26+
Firstline Workers such as retail associates, flight crew members, and field service workers often use a shared mobile device to do their work. That becomes problematic when they start sharing passwords or pin numbers to access customer and business data on the shared device.
2727

2828
Shared device mode allows you to configure an Android device so that it can be easily shared by multiple employees. Employees can sign in and access customer information quickly. When they are finished with their shift or task, they can sign out of the device and it will be immediately ready for the next employee to use.
2929

@@ -32,7 +32,7 @@ Shared device mode also provides Microsoft identity backed management of the dev
3232
To create a shared device mode app, developers and cloud device admins work together:
3333

3434
- Developers write a single-account app (multiple-account apps are not supported in shared device mode), add `"shared_device_mode_supported": true` to the app's configuration, and write code to handle things like shared device sign-out.
35-
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](../users-groups-roles/directory-assign-admin-roles#cloud-device-administrator.md) role can put a device into shared mode by using the [Authenticator app](../user-help/user-help-auth-app-overview.md). You can configure the membership of your organizational roles in the Azure portal via:
35+
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](../users-groups-roles/directory-assign-admin-roles.md#cloud-device-administrator.md) role can put a device into shared mode by using the [Authenticator app](../user-help/user-help-auth-app-overview.md). You can configure the membership of your organizational roles in the Azure portal via:
3636
**Azure Active Directory** > **Roles and Administrators** > **Cloud Device Administrator**.
3737

3838
This article focuses primarily what developers should think about.

articles/active-directory/develop/msal-ios-shared-devices.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.reviewer: brandwe
1616
ms.custom: aaddev
1717
---
1818

19-
# Supporting shared device mode for iOS
19+
# Shared device mode for iOS devices
2020

2121
> [!NOTE]
2222
> This feature is in public preview.
@@ -177,12 +177,10 @@ The following code removes the signed-in account and clears cached tokens from n
177177

178178
#### Clear browser state
179179

180-
The [Microsoft Enterprise SSO plug-in for Apple devices](apple-sso-plugin.md) automatically adds and removes credentials to the Safari browser on the Shared Device. We recommend you rely on this to clear your browser state.
180+
In this public preview version, the [Microsoft Enterprise SSO plug-in for Apple devices](apple-sso-plugin.md) clears state only for applications. It does not clear state on the Safari browser. We recommend you manually clear browser session to ensure no traces of user state are left behind. You can use the optional `signoutFromBrowser` property shown below to clear any cookies. This will cause the browser to briefly launch on the device. Microsoft plans to resolve this issue prior to general availability (GA) of this feature.
181181

182-
> [!NOTE]
183-
> Step Below Required For Public Preview Only
184-
>
185-
> For the moment the Microsoft Enterprise SSO plug-in for Apple devices only clears state on applications. It does not clear state on the Safari browser. We recommend you manually clear browser session to ensure no traces of user state are left behind. You can use the optional `signoutFromBrowser` property shown below to clear any cookies. This will cause the browser to briefly launch on the device. We expect this to be fixed soon and will update documentation when browsers clear state on sign-out automatically.
182+
> [!TIP]
183+
> In a future version this feature, the Microsoft Enterprise SSO plug-in for Apple devices will automatically add credentials to and remove them from the Safari browser on the shared device. Upon release of this feature, we recommend you rely on this to clear your browser state.
186184
187185
#### Swift
188186

0 commit comments

Comments
 (0)