Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
On macOS devices, you can configure Platform SSO to enable single sign-on (SSO) with your Microsoft Entra accounts. Platform SSO allows users to access resources on their macOS devices without needing to enter their credentials repeatedly.
When Platform SSO is configured, you can use the scenarios described in this article to use Kerberos SSO authentication to on-premises resources, enhance security with biometrics, enable SSO on non-Microsoft apps, and improve the user experience.
This feature applies to:
- macOS
Before you begin
You must configure Platform SSO for macOS devices in Microsoft Intune before you configure the scenarios in this article. When it's configured, you have an existing Platform SSO settings catalog policy that you use to add the scenarios described in this article.
Only one SSO policy can be assigned to your groups. So if you already configured Platform SSO, then add these scenario settings to your existing Platform SSO settings catalog policy.
To update you existing settings catalog policy, at a minimum, sign in to the Microsoft Intune admin center with an account that has the following Intune permissions:
- Device Configuration Read, Create, Update, and Assign permissions
There are some built-in roles that have these permissions, including the built-in Policy and Profile Manager Intune role. For more information on RBAC roles in Intune, go to Role-based access control (RBAC) with Microsoft Intune.
Enable Kerberos SSO to on-premises Active Directory and Microsoft Entra ID
Applies to:
- Company Portal version 2508 and newer
Microsoft Entra issues on-premises and cloud-based Kerberos Ticket Granting Tickets (TGTs). Using Platform SSO, you can configure these TGTs to access on-premises Active Directory and Microsoft Entra ID using Apple's Kerberos SSO extension (opens Apple's website).
If you want your users to have SSO access to on-premises and cloud resources that use Kerberos authentication, then this scenario is for you. To learn more about Kerberos SSO in Microsoft Entra, see Enable Kerberos SSO to on-premises Active Directory and Microsoft Entra ID Kerberos resources in Platform SSO.
In your existing Platform SSO settings catalog policy, add the Extension Data setting. The Extension Data setting is a similar concept to an open text field; you can configure any values you need.
In your existing Platform SSO settings catalog policy, add Extension Data:
In the Intune admin center (Devices > Manage devices > Configuration), select your existing Platform SSO settings catalog policy.
In Properties > Configuration settings, select Edit > Add settings.
In the settings picker, expand Authentication, and select Extensible Single Sign On (SSO):
In the list, select Extension Data and close the settings picker:
In Extension Data, Add the following key and your preferred value. Only enter one value for the key.
Key Type Value Description custom_tgt_setting Integer 0Both On-Prem and Cloud TGTs (default) – Maps both on-premises and cloud TGTs. 1On-Prem TGT Only – Maps only the on-premises TGT. 2Cloud TGT Only – Maps only the cloud-based TGT. 3No TGTs – Disables TGT mapping entirely. Select Next to save your changes, and complete the policy. If the policy is already assigned to users or groups, then these groups receive the policy changes the next time they sync with the Intune service.
Touch ID biometric policy with Secure Enclave authentication
On devices that support Touch ID biometric authentication, you can use the Secure Enclave authentication option, as described in Configure Platform SSO for macOS devices in Microsoft Intune.
This policy requires users to authenticate with Touch ID whenever the User Secure Enclave Key needs to be accessed. To learn more about UserSecureEnclaveKeyBiometricPolicy, see UserSecureEnclaveKeyBiometricPolicy.
Add the Extension Data setting to your existing Platform SSO settings catalog policy.
In your existing Platform SSO settings catalog policy, add Extension Data:
In the Intune admin center (Devices > Manage devices > Configuration), select your existing Platform SSO settings catalog policy.
In Properties > Configuration settings, select Edit > Add settings.
In the settings picker, expand Authentication, and select Extensible Single Sign On (SSO):
In the list, select Extension Data and close the settings picker:
In Extension Data, Add the following key and value:
Key Type Value Description enable_se_key_biometric_policy Boolean True Copy and paste this value. Select Next to save your changes, and complete the policy. If the policy is already assigned to users or groups, then these groups receive the policy changes the next time they sync with the Intune service.
Non-Microsoft apps and Microsoft Enterprise SSO Extension settings
If you previously used the Microsoft Enterprise SSO Extension, and/or want to enable SSO on non-Microsoft apps, then add the Extension Data setting to your existing Platform SSO settings catalog policy.
In this scenario, we use the Extension Data setting to:
- Configure settings you used in your previous Microsoft Enterprise SSO Extension Intune policy.
- Configure settings that allow non-Microsoft apps to use SSO.
This scenario lists the minimum recommended settings you should add. If you had a previous Microsoft Enterprise SSO Extension policy, you might have configured more settings. We recommend you add any other key & value pair settings you configured in your previous Microsoft Enterprise SSO Extension policy.
The following settings are commonly recommended for configuring SSO settings, including configuring SSO support for non-Microsoft applications.
In your existing Platform SSO settings catalog policy, add Extension Data:
In the Intune admin center (Devices > Manage devices > Configuration), select your existing Platform SSO settings catalog policy.
In Properties > Configuration settings, select Edit > Add settings.
In the settings picker, expand Authentication, and select Extensible Single Sign On (SSO):
In the list, select Extension Data and close the settings picker:
In Extension Data, Add the following keys and values:
Key Type Value Description AppPrefixAllowList String com.microsoft.,com.apple.Copy and paste this value in the setting.
AppPrefixAllowList lets you create a list of app vendors with apps that can use SSO. You can add more app vendors to this list as needed.browser_sso_interaction_enabled Integer 1Configures a recommended broker setting. disable_explicit_app_prompt Integer 1Configures a recommended broker setting. The following example shows the recommended configuration:
Select Next to save your changes, and complete the policy. If the policy is already assigned to users or groups, then these groups receive the policy changes the next time they sync with the Intune service.
End user experience settings
There are some settings that customize the end-user experience and give more granular control on user privileges. Any undocumented Platform SSO settings aren't supported.
In your existing Platform SSO settings catalog policy, use the following optional settings:
| Platform SSO settings | Possible values | Usage |
|---|---|---|
| Account Display Name | Any string value | Customize the organization name end users see in the Platform SSO notifications. |
| Enable Create User At Login | Enable or Disable | Allow any organizational user to sign in to the device using their Microsoft Entra credentials. When you create new local accounts, the provided username and password must be the same as the user's Microsoft Entra ID UPN (user@contoso.com) and password. |
| New User Authorization Mode | Standard, Admin, or Groups | One-time permissions the user has at sign-in when the account is created using Platform SSO. Currently, Standard and Admin values are supported. At least one Admin user is required on the device before Standard mode can be used. |
| User Authorization Mode | Standard, Admin, or Groups | Persistent permissions the user has at sign-in each time the user authenticates using Platform SSO. Currently, Standard and Admin values are supported. At least one Admin user is required on the device before Standard mode can be used. |
| Non Platform SSO Accounts | Enter the local account names you want to exclude from Platform SSO. | This list of local accounts aren't prompted to register for Platform SSO. This setting is appropriate for accounts that shouldn't be registered with a Microsoft Entra account, like the local admin account. The accounts listed in this policy aren't subject to the FileVaultPolicy, LoginPolicy, or UnlockPolicy. |
| FileVault Policy | AttemptAuthentication, RequireAuthentication, AllowOfflineGracePeriod or AllowAuthenticationGracePeriod | Use AttemptAuthentication to force the device to verify the Microsoft Entra ID password with Microsoft Entra when a Mac device is turned on. This setting applies to macOS 15 and later. |