Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Give your users a better sign-in experience with the macOS Microsoft Enterprise SSO plug-in
    Intune

    Give your users a better sign-in experience with the macOS Microsoft Enterprise SSO plug-in

    Peter KlapwijkBy Peter KlapwijkDecember 18, 2020Updated:April 22, 202114 Mins Read
    Blue glowing key on blue glowing computer matrix

    With the Intune release from October 2020, the macOS Microsoft Enterprise SSO plug-in became available (in preview). The plug-in is designed to provide a better sign-in experience by limiting the authentication prompts a user gets on his macOS device when accessing Azure AD connected applications.

    The SSO plug-in allows any application to participate in single sign-on even if it was not developed using a Microsoft SDK like the Microsoft Authentication Library (MSAL).

    In this post, I show the settings I used for testing, which provides an SSO experience for the Safari browser and the Pulse Secure VPN client (which also uses AAD authentication).

    The minimum supported macOS version on which the extension supports is 10.15.

    Create an Device features Profile

    As written in the documentation we should use the sso app extension type Azure AD.
    To configure the Microsoft Enterprise SSO plug-in for apps that don’t use MSAL we can provide the App bundle ID in the profile. In the documentation also two additional settings are found to further reduce the number of authentication prompt.

    The settings to configure the plug-in are found in the Device features profile.

    • Sign-in to the Endpoint Manager admin center
    • Browse to Devices – macOS
    • On the Configuration Profiles tab click +Create profile
    • Choose Device features as Profile type
    • Click Create
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Click Next
    • Scroll down and open Single sign-on app extension
    • Select Microsoft Azure AD as sso app extension type

    Provide the App bundle IDs of the apps that don`t support MSAL

    You can look up the bundle IDs by running this in Terminal:

    osascript -e 'id of app "Name of App"'

    For example

    osascript -e 'id of app "Microsoft Outlook"'

    Enter these two keys, for both choose Integer as Type and enter value 1:
    browser_sso_interaction_enabled
    disable_explicit_app_prompt

    Finish the setup wizard by assigning the profile to a security group of choice.

    End-user experience

    Time to have a look at the end-user experience.

    I tested several Office 365 apps with and without the profile applied, and with and without the app IDs added to the profile. For the first Office app you need to sign-in with full credentials. As soon as you`re signed in to the first app of the Office suite, you don`t need to provide any credentials or only the username in the other apps. The policy seems to not change anything in that behavior. I expected to auto sign-in to the very first app and so on.

    For the Pulse VPN client which I used for testing as a third-party app, there is a big difference in the sign-in experience. Without the policy applied, the username and password need to be applied for authentication. With the policy applied, I get a real SSO experience.

    Also for Safari, I see a real SSO experience when the policy is applied, which we don`t see without the policy.
    The SSO experience with the Safari browser is shown below. I signed out from Office 365, choose to forget the account and closed Safari. After starting Safari, I still get an SSO experience.

    I also tested the new Microsoft Edge browser (version 87), with different settings without much luck to get an SSO experience. Until I installed and used the Beta (v88) and Dev (v89) versions of the browser. When signed in to the browser, you finally get an SSO experience when visiting Office 365. But still, I needed to sign-in to the browser itself.

    The feature is still in preview and as more apps might support MSAL in the future, user experience might get better for more and more apps.

    For now, happy testing and let me know your experience with the SSO extension.

    Update January 2021:

    At this moment only the Company Portal and Microsoft Teams app support MSAL. The other apps from the Office suite should get MSAL support later in 2021.

    Browser Intune macOS MEM Microsoft Endpoint Manager
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Manage Mozilla Firefox proxy settings with Microsoft Intune

    June 24, 2021

    Stop shortcut files from syncing to OneDrive

    May 13, 2021

    Controlling managed favorites for Edge with Microsoft Intune – Windows

    May 16, 2020
    View 1 Comment

    1 Comment

    1. Ivan on December 20, 2020 06:24

      I too have been trying this for the past week or so. It doesn’t seem to really ‘work’ on anything either than the native Safari browser. Having SSO for the Outlook client would be great (MS Claims that it is currently supported but no one from there seems to know how to configure it). At least with OneDrive and Teams they are honest in replying that it isn’t yet supported. Even with the Bundle IDs provided.
      I’d really love to know your experience with getting SSO on the Outlook client working. We are deploying Outlook as part of the office bundle that is ‘baked in’ to the MEM portal’.
      Great work on the article please keep them coming as they are a great reference and/or sanity check for what we are also trying.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}