Join a Mac device with Microsoft Entra ID and configure it for shared device scenarios (Preview)
In this tutorial, you will learn how to configure a Microsoft Entra Joined Mac via Mobile Device Management (MDM) to support multiple users. There are three methods in which you can register a Mac device with Platform SSO (PSSO), secure enclave, smart card, or password. We recommend using secure enclave or smart card for the best passwordless experience, however shared or multi-user Macs may benefit from using the password method instead. Common scenarios for shared Macs with passwords would be computer labs in schools or universities. In these scenarios, students use multiple devices, multiple students use the same device, and they only have passwords and no MFA or passwordless credentials.
- A required minimum version of macOS 14 Sonoma or later. While macOS 13 Ventura is supported for Platform SSO overall, only Sonoma supports the necessary tools for the Platform SSO shared Mac scenario described in this guide.
- Microsoft Intune Company Portal app version 5.2404.0 or later.
- A configured Platform SSO MDM payload in your MDM by an administrator.
There are three main steps for configuring Platform SSO on a shared device:
- Deploy Company Portal. For more information, see Add the Company Portal for macOS app.
- Deploy Platform SSO Configuration. Create and deploy a settings catalog profile with the required Platform SSO Configuration.
- Deploy macOS Login Screen Configuration. The macOS Login screen configuration can be changed to allow new users to log in.
Your Platform SSO MDM profile should apply the following configurations to support multi-user devices:
Configuration Paramter | Value(s) | Note |
---|---|---|
Screen Locked Behavior | Do Not Handle | Required |
Registration Token | {{DEVICEREGISTRATION}} | Recommended for the best registration user experience |
Authentication Method | Password | Recommended for this article, secure enclave key is recommended for single user devices |
Enable Authorization | Enabled | Required |
Enable Create User At Login | Enabled | Required |
New User Authorization Mode | Standard | Recommended |
Token To User Mapping --> Account Name | preferred_username | Required |
Token To User Mapping --> Full Name | name | Required |
Use Shared Device Keys | Enabled | Required |
User Authorization Mode | Standard | Recommended |
Team Identifier | UBF8T346G9 | Required |
Extension Identifier | com.microsoft.CompanyPortalMac.ssoextension | Required |
Type | Redirect | Required |
URLs | https://login.microsoftonline.com, https://login.microsoft.com, https://sts.windows.net, https://login.partner.microsoftonline.cn, https://login.chinacloudapi.cn, https://login.microsoftonline.us, https://login-us.microsoftonline.com | Required |
If you use Intune as your MDM of choice, then the configuration profile settings will appear like this:
To allow new users to log on and be created from the macOS login screen, there are two configurations that can be used:
Show Other Users Managed. With this configuration, the macOS login screen shows a list of profiles that have been created and an "other user" button that can be used to log in with a username and password. Users can select their existing profile to log in or log in with their Microsoft Entra ID user principal name (UPN).
Show full name. With this configuration, the macOS login screen displays and username and password field with no list of users. Users can log in with their Microsoft Entra ID UPN.
These configurations can be found in Intune Settings Catalog under Login > Login Window Behavior.
To register a Mac device with Platform SSO, devices must be enrolled into MDM. For shared devices, the user who sets up the device would typically be an administrator or technician - this user will have local administrative rights unless there is alternative local admin account created.
Note
If you are enrolling using Automated Device Enrollment you may choose to encourage the user setting up the device to create the local account as:
- Account name: Microsoft Entra ID username (eg. user@domain.com).
- Full Name: First and Last Name. This is because the local account that is created during setup assistant will be associated with the Microsoft Entra ID account during registration.
There are three high-level steps to set up Platform SSO on a shared device:
- IT admin or delegated person enrolls device with Intune.
- IT admin or delegated person registers the device with Microsoft Entra ID using their credentials.
- Now the device is ready for new users to log in from the Microsoft Entra ID login screen.
Organizations can enroll shared devices into Intune using different methods depending on the device ownership.
Enrollment method | Device Ownership | Requirements |
---|---|---|
Automated Device Enrollment with no user affinity | Company or school owned | ✔️Registration in Apple Business Manager ✔️ Automated Device Enrollment configured in Intune |
Company Portal | Personal | None |
Once the device is MDM enrolled and has Company Portal installed, you need to register your device with Platform SSO. A Registration Required popup appears at the top right of the screen. Use the popup to register your device with Platform SSO using your Microsoft Entra ID credentials:
Navigate to the Registration Required popup at the top right of the screen. Hover over the popup and select Register.
You're prompted to register your device with Microsoft Entra ID. Enter your sign-in credentials and select Next.
- Your administrator may have configured MFA for the device registration flow. If so, open your Authenticator app on your mobile device and complete the MFA flow.
When a Single Sign-On window appears, enter your local account password and select OK.
If your local password differs to your Microsoft Entra ID password, an Authentication Required popup appears on the top right of the screen. Hover over the banner and select Sign-in.
When a Microsoft Entra window appears, enter your Microsoft Entra ID password and select Sign In.
After unlocking the Mac, you can now use Platform SSO to access Microsoft app resources. From this point on, your old password doesn't work because Platform SSO is enabled for your device.
After completing the steps above, it's recommended to check your device registration status.
To check that registration has completed successfully, navigate to Settings and select Users & Groups.
Select Edit next to Network Account Server and check that Platform SSO is listed as Registered.
To verify the method used for authentication, navigate to your username in the Users & Groups window and select the Information icon. Check the method listed, which should be Secure enclave, Smart Card, or Password.
Note
You can also use the Terminal app to check the registration status. Run the following command to check the status of your device registration. You should see in the bottom of the output that SSO tokens are retrieved. For macOS 13 Ventura users, this command is required to check the registration status.
app-sso platform -s
Next you should validate that the device is ready for other users in the tenant to log into it.
- Log out of the Mac with the account that you used to do the initial setup.
- At the login screen, choose the Other... option to sign in with a new user account
- Enter a user's Microsoft Entra ID User Principal Name and password.
- If the User Principal Name and password were correct then the user will be logged in. The user is directed to go through several Setup Assistant dialog screens by default and then they land on the macOS desktop.
If the user cannot sign in successfully, then use the following resources to troubleshoot:
- Refer to the macOS Platform single sign-on known issues and troubleshooting guide
- Validate that the user can successfully sign in to Microsoft Entra ID using their User Principal Name and password in a browser on another device. You can test by having the user go to a web app, such as https://myapplications.windowsazure.cn