-
Notifications
You must be signed in to change notification settings - Fork 10
Description
We are using OpenUnison integrated with Microsoft Entra ID as our Identity Provider via OIDC EntraID Applications.
Recently, we implemented a Conditional Access policy that enforces device registration/join and compliance for privileged users accessing SSO-connected applications.
We’ve observed that OpenUnison EntraID Apps do not consistently transmit device compliance context when accessed from Windows or Linux clients. However, MacOS clients appear to behave correctly and transmit full device context.
Observations:
Windows/Linux Clients:
Device info is missing or incomplete in the EntraID sign-in logs.
Conditional Access evaluation fails due to lack of device context.
Example log:
Device ID: -
Device browser: Firefox 142.0
OS: Windows10
Compliant: No
Managed: No
Join Type: -
MacOS Clients:
Device info is transmitted correctly.
Conditional Access evaluation succeeds.
Example log:
Device ID: xxxxx
Device browser: Chrome 139.0.0
OS: MacOS
Compliant: Yes
Managed: Yes
Join Type: Azure AD joined
Technical Assumptions:
OpenUnison does not use MSAL or WAM, and its OIDC flow is standards-compliant but not Microsoft-optimized.
As a result:
It cannot request or pass the deviceid claim.
It cannot trigger Conditional Access evaluation with full device context, unless the browser session already includes it.
Questions:
Is this behavior expected due to OpenUnison’s OIDC implementation?
Or is this a configuration issue on our end that can be resolved?
Are there any recommended approaches to ensure device context is consistently passed for Conditional Access evaluation?
Additional Info:
Microsoft browser extensions and policies are centrally deployed to all endpoints to support SSO.
Other OIDC-integrated applications do not exhibit this issue – only OpenUnison apps are affected.