Join a Mac device with Microsoft Entra ID and configure it for shared device scenarios (Preview)

In this tutorial, you will learn how to configure a Microsoft Entra Joined Mac via Mobile Device Management (MDM) to support multiple users. There are three methods in which you can register a Mac device with Platform SSO (PSSO), secure enclave, smart card, or password. We recommend using secure enclave or smart card for the best passwordless experience, however shared or multi-user Macs may benefit from using the password method instead. Common scenarios for shared Macs with passwords would be computer labs in schools or universities. In these scenarios, students use multiple devices, multiple students use the same device, and they only have passwords and no MFA or passwordless credentials.

Prerequisites

  • A required minimum version of macOS 14 Sonoma or later. While macOS 13 Ventura is supported for Platform SSO overall, only Sonoma supports the necessary tools for the Platform SSO shared Mac scenario described in this guide.
  • Microsoft Intune Company Portal app version 5.2404.0 or later.
  • A configured Platform SSO MDM payload in your MDM by an administrator.

MDM configuration

There are three main steps for configuring Platform SSO on a shared device:

  1. Deploy Company Portal. For more information, see Add the Company Portal for macOS app.
  2. Deploy Platform SSO Configuration. Create and deploy a settings catalog profile with the required Platform SSO Configuration.
  3. Deploy macOS Login Screen Configuration. The macOS Login screen configuration can be changed to allow new users to log in.

Platform SSO profile configuration

Your Platform SSO MDM profile should apply the following configurations to support multi-user devices:

Configuration Paramter Value(s) Note
Screen Locked Behavior Do Not Handle Required
Registration Token {{DEVICEREGISTRATION}} Recommended for the best registration user experience
Authentication Method Password Recommended for this article, secure enclave key is recommended for single user devices
Enable Authorization Enabled Required
Enable Create User At Login Enabled Required
New User Authorization Mode Standard Recommended
Token To User Mapping --> Account Name preferred_username Required
Token To User Mapping --> Full Name name Required
Use Shared Device Keys Enabled Required
User Authorization Mode Standard Recommended
Team Identifier UBF8T346G9 Required
Extension Identifier com.microsoft.CompanyPortalMac.ssoextension Required
Type Redirect Required
URLs https://login.microsoftonline.com, https://login.microsoft.com, https://sts.windows.net, https://login.partner.microsoftonline.cn, https://login.chinacloudapi.cn, https://login.microsoftonline.us, https://login-us.microsoftonline.com Required

If you use Intune as your MDM of choice, then the configuration profile settings will appear like this:

Screenshot of a Platform SSO MDM profile in Intune.

macOS login screen configuration

To allow new users to log on and be created from the macOS login screen, there are two configurations that can be used:

  • Show Other Users Managed. With this configuration, the macOS login screen shows a list of profiles that have been created and an "other user" button that can be used to log in with a username and password. Users can select their existing profile to log in or log in with their Microsoft Entra ID user principal name (UPN).

  • Show full name. With this configuration, the macOS login screen displays and username and password field with no list of users. Users can log in with their Microsoft Entra ID UPN.

These configurations can be found in Intune Settings Catalog under Login > Login Window Behavior.

Enrolling and registering devices

To register a Mac device with Platform SSO, devices must be enrolled into MDM. For shared devices, the user who sets up the device would typically be an administrator or technician - this user will have local administrative rights unless there is alternative local admin account created.

Note

If you are enrolling using Automated Device Enrollment you may choose to encourage the user setting up the device to create the local account as:

  • Account name: Microsoft Entra ID username (eg. user@domain.com).
  • Full Name: First and Last Name. This is because the local account that is created during setup assistant will be associated with the Microsoft Entra ID account during registration.

There are three high-level steps to set up Platform SSO on a shared device:

  1. IT admin or delegated person enrolls device with Intune.
  2. IT admin or delegated person registers the device with Microsoft Entra ID using their credentials.
  3. Now the device is ready for new users to log in from the Microsoft Entra ID login screen.

Organizations can enroll shared devices into Intune using different methods depending on the device ownership.

Enrollment method Device Ownership Requirements
Automated Device Enrollment with no user affinity Company or school owned ✔️Registration in Apple Business Manager
✔️ Automated Device Enrollment configured in Intune
Company Portal Personal None

Platform SSO registration

Once the device is MDM enrolled and has Company Portal installed, you need to register your device with Platform SSO. A Registration Required popup appears at the top right of the screen. Use the popup to register your device with Platform SSO using your Microsoft Entra ID credentials:

  1. Navigate to the Registration Required popup at the top right of the screen. Hover over the popup and select Register.

    Screenshot of a desktop screen with a registration required popup in the top right of the screen.

  2. You're prompted to register your device with Microsoft Entra ID. Enter your sign-in credentials and select Next.

    1. Your administrator may have configured MFA for the device registration flow. If so, open your Authenticator app on your mobile device and complete the MFA flow.

    Screenshot of the registration window prompting sign in with Microsoft.

  3. When a Single Sign-On window appears, enter your local account password and select OK.

    Screenshot of a single sign-on window prompting the user to enter their local account password.

  4. If your local password differs to your Microsoft Entra ID password, an Authentication Required popup appears on the top right of the screen. Hover over the banner and select Sign-in.

  5. When a Microsoft Entra window appears, enter your Microsoft Entra ID password and select Sign In.

    Screenshot of a Microsoft Entra sign in window.

  6. After unlocking the Mac, you can now use Platform SSO to access Microsoft app resources. From this point on, your old password doesn't work because Platform SSO is enabled for your device.


Check your device registration status

After completing the steps above, it's recommended to check your device registration status.

  1. To check that registration has completed successfully, navigate to Settings and select Users & Groups.

  2. Select Edit next to Network Account Server and check that Platform SSO is listed as Registered.

  3. To verify the method used for authentication, navigate to your username in the Users & Groups window and select the Information icon. Check the method listed, which should be Secure enclave, Smart Card, or Password.

    Note

    You can also use the Terminal app to check the registration status. Run the following command to check the status of your device registration. You should see in the bottom of the output that SSO tokens are retrieved. For macOS 13 Ventura users, this command is required to check the registration status.

    app-sso platform -s
    

Test the Enable Create User At Login Functionality

Next you should validate that the device is ready for other users in the tenant to log into it.

  1. Log out of the Mac with the account that you used to do the initial setup.
  2. At the login screen, choose the Other... option to sign in with a new user account

Screenshot of the macOS login screen.

  1. Enter a user's Microsoft Entra ID User Principal Name and password.

Screenshot of the macOS login box where a user has entered their credentials.

  1. If the User Principal Name and password were correct then the user will be logged in. The user is directed to go through several Setup Assistant dialog screens by default and then they land on the macOS desktop.

Troubleshooting

If the user cannot sign in successfully, then use the following resources to troubleshoot:

  1. Refer to the macOS Platform single sign-on known issues and troubleshooting guide
  2. Validate that the user can successfully sign in to Microsoft Entra ID using their User Principal Name and password in a browser on another device. You can test by having the user go to a web app, such as https://myapplications.windowsazure.cn

See also