title | titleSuffix | description | keywords | author | ms.author | manager | ms.date | ms.topic | ms.service | ms.localizationpriority | ms.technology | ms.assetid | ms.reviewer | ms.suite | search.appverid | ms.custom | ms.collection |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Add app configuration policies for managed iOS devices |
Microsoft Intune |
Learn how to use app configuration policies to provide configuration data to an iOS app when it is run. |
Erikre |
erikre |
dougeby |
07/15/2019 |
conceptual |
microsoft-intune |
high |
c9163693-d748-46e0-842a-d9ba113ae5a8 |
mghadial |
ems |
MET150 |
intune-azure |
M365-identity-device-management |
[!INCLUDE azure_portal]
Use app configuration policies in Microsoft Intune to provide custom configuration settings for an iOS app. These configuration settings allow an app to be customized based on the app suppliers direction. You must get these configuration settings (keys and values) from the supplier of the app. To configure the app, you specify the settings as keys and values, or as XML containing the keys and values.
As the Microsoft Intune admin, you can control which user accounts are added to Microsoft Office applications on managed devices. You can limit access to only allowed organization user accounts and block personal accounts on enrolled devices. The supporting applications process the app configuration and remove and block unapproved accounts. The configuration policy settings are used when the app checks for them, typically the first time it is run.
Once you add an app configuration policy, you can set the assignments for the app configuration policy. When you set the assignments for the policy, you can choose to include and exclude the groups of users for which the policy applies. When you choose to include one or more groups, you can choose to select specific groups to include or select built-in groups. Built-in groups include All Users, All Devices, and All Users + All Devices.
Note
Intune provides pre-created All Users and All Devices groups in the console with built-in optimizations for your convenience. It is highly recommended that you use these groups to target all users and all devices instead of any ‘All users’ or ’All devices’ groups you may have created yourself.
Once you have selected the included groups for your application configuration policy, you can also choose the specific groups to exclude. For more information, see Include and exclude app assignments in Microsoft Intune.
Tip
This policy type is currently available only for devices running iOS 8.0 and later. It supports the following app installation types:
- Managed iOS app from the app store
- App package for iOS
For more information about app installation types, see How to add an app to Microsoft Intune. For more information about incorporating app config into your .ipa app package for managed devices, see Managed App Configuration in the iOS developer documentation.
-
Sign in to Intune.
-
Choose the Client apps workload.
-
Choose App configuration policies in the Manage group, and then choose Add.
-
Set the following details:
- Name - The name of the profile that appears in the Azure portal.
- Description - The description of the profile that appears in the Azure portal.
- Device enrollment type - Choose Managed devices for devices that have been enrolled in Intune.
-
Select iOS for Platform.
-
Choose Associated app. Then, on the Associated app pane, choose the managed app to which you want to apply the configuration and select OK.
-
On the Add configuration policy pane, choose Configuration settings.
-
Select Configuration settings format. Select one of the following methods to add configuration information:
- Use configuration designer
- Enter XML data
For details about using the configuration designer, see Use configuration designer. For details about entering XML data, see Enter XML data.
-
Once you have added your configuration information, choose OK, and then choose Add to add the configuration policy. The overview pane for the configuration policy is displayed.
-
Select Assignments to display the include and exclude options.
-
Select All Users on the Include tab.
-
Select the Exclude tab.
-
Click Select groups to exclude to display the related pane.
-
Choose the groups you want to exclude and then click Select.
[!NOTE] When adding a group, if any other group has already been included for a given assignment type, it is pre-selected and unchangeable for other include assignment types. Therefore, that group that has been used, cannot be used as an excluded group.
-
Click Save.
Microsoft Intune provides configuration settings that are unique to an app. You can use the configuration designer for apps on devices that are enrolled or not enrolled in Microsoft Intune. The designer lets you configure specific configuration keys and values that helps you create the underlying XML. You must also specify the data type for each value. These settings are supplied to apps automatically when the apps are installed.
- For each key and value in the configuration, set:
- Configuration key - The key that uniquely identifies the specific setting configuration.
- Value type - The data type of the configuration value. Types include Integer, Real, String, or Boolean.
- Configuration value - The value for the configuration.
- Choose OK to set your configuration settings.
- Choose the ellipsis (...) next to the setting.
- Select Delete.
The {{ and }} characters are used by token types only and must not be used for other purposes.
For iOS devices, use the following key/value pairs:
Key | IntuneMAMAllowedAccountsOnly |
---|---|
Values |
|
Note
You must use OneDrive for iOS 10.34 or later and Outlook for iOS 2.99.0 or later and the app must be targeted with Intune app protection policies when allowing only configured organization accounts with multi-identity.
You can type or paste an XML property list that contains the app configuration settings for devices enrolled in Intune. The format of the XML property list varies depending on the app that you are configuring. For details about the exact format to use, contact the supplier of the app.
Intune validates the XML format. However, Intune does not check that the XML property list (PList) works with the target app.
To learn more about XML property lists:
- Refer to Understand XML Property Lists in the iOS Developer Library.
When you create an app configuration file, you can specify one or more of the following values by using this format:
<dict>
<key>userprincipalname</key>
<string>{{userprincipalname}}</string>
<key>mail</key>
<string>{{mail}}</string>
<key>partialupn</key>
<string>{{partialupn}}</string>
<key>accountid</key>
<string>{{accountid}}</string>
<key>deviceid</key>
<string>{{deviceid}}</string>
<key>userid</key>
<string>{{userid}}</string>
<key>username</key>
<string>{{username}}</string>
<key>serialnumber</key>
<string>{{serialnumber}}</string>
<key>serialnumberlast4digits</key>
<string>{{serialnumberlast4digits}}</string>
<key>udidlast4digits</key>
<string>{{udidlast4digits}}</string>
<key>aaddeviceid</key>
<string>{{aaddeviceid}}</string>
</dict>
Intune supports the following data types in a property list:
- <integer>
- <real>
- <string>
- <array>
- <dict>
- <true /> or <false />
Additionally, Intune supports the following token types in the property list:
- {{userprincipalname}}—for example, [email protected]
- {{mail}}—for example, [email protected]
- {{partialupn}}—for example, John
- {{accountid}}—for example, fc0dc142-71d8-4b12-bbea-bae2a8514c81
- {{deviceid}}—for example, b9841cd9-9843-405f-be28-b2265c59ef97
- {{userid}}—for example, 3ec2c00f-b125-4519-acf0-302ac3761822
- {{username}}—for example, John Doe
- {{serialnumber}}—for example, F4KN99ZUG5V2 (for iOS devices)
- {{serialnumberlast4digits}}—for example, G5V2 (for iOS devices)
- {{aaddeviceid}}—for example, ab0dc123-45d6-7e89-aabb-cde0a1234b56
DEP (Apple's Device Enrollment Program) enrollments are not compatible with the app store version of the Company Portal app. However, you can configure the Company Portal app to support iOS DEP devices using the following steps.
-
In the Intune on Azure portal:
- Add the Intune Company Portal if necessary, by going to Intune > Client Apps > Apps > Add.
- Go to Client apps > App configuration policies, to create an app configuration policy for the Company Portal app.
-
Create an app configuration policy with the XML below. More information on how to create an app configuration policy and enter XML data can be found at Add app configuration policies for managed iOS devices or for hybrid MDM, Apply settings to iOS apps with app configuration policies in System Center Configuration Manager.
<dict> <key>IntuneCompanyPortalEnrollmentAfterUDA</key> <dict> <key>IntuneDeviceId</key> <string>{{deviceid}}</string> <key>UserId</key> <string>{{userid}}</string> </dict> </dict>
-
Deploy the Company Portal to devices with the app configuration policy targeted to desired groups. Be sure to only deploy the policy to groups of devices that are already DEP enrolled.
-
Tell end users to sign into the Company Portal app when it is automatically installed.
Once a configuration policy has been assigned, you can monitor iOS app configuration status for each managed device. From Microsoft Intune in the Azure portal, select Devices > All devices. From the list of managed devices, select a specific device to display a blade for the device. On the device blade, select App configuration.