Skip to content

Latest commit

 

History

History
216 lines (165 loc) · 12.3 KB

app-configuration-policies-use-ios.md

File metadata and controls

216 lines (165 loc) · 12.3 KB
title titleSuffix description keywords author ms.author manager ms.date ms.topic ms.service ms.localizationpriority ms.technology ms.assetid ms.reviewer ms.suite search.appverid ms.custom ms.collection
Add app configuration policies for managed iOS devices
Microsoft Intune
Learn how to use app configuration policies to provide configuration data to an iOS app when it is run.
Erikre
erikre
dougeby
07/15/2019
conceptual
microsoft-intune
high
c9163693-d748-46e0-842a-d9ba113ae5a8
mghadial
ems
MET150
intune-azure
M365-identity-device-management

Add app configuration policies for managed iOS devices

[!INCLUDE azure_portal]

Use app configuration policies in Microsoft Intune to provide custom configuration settings for an iOS app. These configuration settings allow an app to be customized based on the app suppliers direction. You must get these configuration settings (keys and values) from the supplier of the app. To configure the app, you specify the settings as keys and values, or as XML containing the keys and values.

As the Microsoft Intune admin, you can control which user accounts are added to Microsoft Office applications on managed devices. You can limit access to only allowed organization user accounts and block personal accounts on enrolled devices. The supporting applications process the app configuration and remove and block unapproved accounts. The configuration policy settings are used when the app checks for them, typically the first time it is run.

Once you add an app configuration policy, you can set the assignments for the app configuration policy. When you set the assignments for the policy, you can choose to include and exclude the groups of users for which the policy applies. When you choose to include one or more groups, you can choose to select specific groups to include or select built-in groups. Built-in groups include All Users, All Devices, and All Users + All Devices.

Note

Intune provides pre-created All Users and All Devices groups in the console with built-in optimizations for your convenience. It is highly recommended that you use these groups to target all users and all devices instead of any ‘All users’ or ’All devices’ groups you may have created yourself.

Once you have selected the included groups for your application configuration policy, you can also choose the specific groups to exclude. For more information, see Include and exclude app assignments in Microsoft Intune.

Tip

This policy type is currently available only for devices running iOS 8.0 and later. It supports the following app installation types:

  • Managed iOS app from the app store
  • App package for iOS

For more information about app installation types, see How to add an app to Microsoft Intune. For more information about incorporating app config into your .ipa app package for managed devices, see Managed App Configuration in the iOS developer documentation.

Create an app configuration policy

  1. Sign in to Intune.

  2. Choose the Client apps workload.

  3. Choose App configuration policies in the Manage group, and then choose Add.

  4. Set the following details:

    • Name - The name of the profile that appears in the Azure portal.
    • Description - The description of the profile that appears in the Azure portal.
    • Device enrollment type - Choose Managed devices for devices that have been enrolled in Intune.
  5. Select iOS for Platform.

  6. Choose Associated app. Then, on the Associated app pane, choose the managed app to which you want to apply the configuration and select OK.

  7. On the Add configuration policy pane, choose Configuration settings.

  8. Select Configuration settings format. Select one of the following methods to add configuration information:

  9. Once you have added your configuration information, choose OK, and then choose Add to add the configuration policy. The overview pane for the configuration policy is displayed.

  10. Select Assignments to display the include and exclude options.

    Screenshot of Policy assignments Include tab

  11. Select All Users on the Include tab.

    Screenshot of Policy assignments - All Users dropdown option

  12. Select the Exclude tab.

  13. Click Select groups to exclude to display the related pane.

    Screenshot of Policy assignments - Select groups to exclude blade

  14. Choose the groups you want to exclude and then click Select.

    [!NOTE] When adding a group, if any other group has already been included for a given assignment type, it is pre-selected and unchangeable for other include assignment types. Therefore, that group that has been used, cannot be used as an excluded group.

  15. Click Save.

Use configuration designer

Microsoft Intune provides configuration settings that are unique to an app. You can use the configuration designer for apps on devices that are enrolled or not enrolled in Microsoft Intune. The designer lets you configure specific configuration keys and values that helps you create the underlying XML. You must also specify the data type for each value. These settings are supplied to apps automatically when the apps are installed.

Add a setting

  1. For each key and value in the configuration, set:
    • Configuration key - The key that uniquely identifies the specific setting configuration.
    • Value type - The data type of the configuration value. Types include Integer, Real, String, or Boolean.
    • Configuration value - The value for the configuration.
  2. Choose OK to set your configuration settings.

Delete a setting

  1. Choose the ellipsis (...) next to the setting.
  2. Select Delete.

The {{ and }} characters are used by token types only and must not be used for other purposes.

Allow only configured organization accounts in multi-identity apps

For iOS devices, use the following key/value pairs:

Key IntuneMAMAllowedAccountsOnly
Values
  • Enabled: The only account allowed is the managed user account defined by the IntuneMAMUPN key.
  • Disabled (or any value that is not a case insensitive match to Enabled): Any account is allowed.

Note

You must use OneDrive for iOS 10.34 or later and Outlook for iOS 2.99.0 or later and the app must be targeted with Intune app protection policies when allowing only configured organization accounts with multi-identity.

Enter XML data

You can type or paste an XML property list that contains the app configuration settings for devices enrolled in Intune. The format of the XML property list varies depending on the app that you are configuring. For details about the exact format to use, contact the supplier of the app.

Intune validates the XML format. However, Intune does not check that the XML property list (PList) works with the target app.

To learn more about XML property lists:

Example format for an app configuration XML file

When you create an app configuration file, you can specify one or more of the following values by using this format:

<dict>
  <key>userprincipalname</key>
  <string>{{userprincipalname}}</string>
  <key>mail</key>
  <string>{{mail}}</string>
  <key>partialupn</key>
  <string>{{partialupn}}</string>
  <key>accountid</key>
  <string>{{accountid}}</string>
  <key>deviceid</key>
  <string>{{deviceid}}</string>
  <key>userid</key>
  <string>{{userid}}</string>
  <key>username</key>
  <string>{{username}}</string>
  <key>serialnumber</key>
  <string>{{serialnumber}}</string>
  <key>serialnumberlast4digits</key>
  <string>{{serialnumberlast4digits}}</string>
  <key>udidlast4digits</key>
  <string>{{udidlast4digits}}</string>
  <key>aaddeviceid</key>
  <string>{{aaddeviceid}}</string>
</dict>

Supported XML PList data types

Intune supports the following data types in a property list:

  • <integer>
  • <real>
  • <string>
  • <array>
  • <dict>
  • <true /> or <false />

Tokens used in the property list

Additionally, Intune supports the following token types in the property list:

  • {{userprincipalname}}—for example, [email protected]
  • {{mail}}—for example, [email protected]
  • {{partialupn}}—for example, John
  • {{accountid}}—for example, fc0dc142-71d8-4b12-bbea-bae2a8514c81
  • {{deviceid}}—for example, b9841cd9-9843-405f-be28-b2265c59ef97
  • {{userid}}—for example, 3ec2c00f-b125-4519-acf0-302ac3761822
  • {{username}}—for example, John Doe
  • {{serialnumber}}—for example, F4KN99ZUG5V2 (for iOS devices)
  • {{serialnumberlast4digits}}—for example, G5V2 (for iOS devices)
  • {{aaddeviceid}}—for example, ab0dc123-45d6-7e89-aabb-cde0a1234b56

Configure the Company Portal app to support iOS DEP devices

DEP (Apple's Device Enrollment Program) enrollments are not compatible with the app store version of the Company Portal app. However, you can configure the Company Portal app to support iOS DEP devices using the following steps.

  1. In the Intune on Azure portal:

    • Add the Intune Company Portal if necessary, by going to Intune > Client Apps > Apps > Add.
    • Go to Client apps > App configuration policies, to create an app configuration policy for the Company Portal app.
  2. Create an app configuration policy with the XML below. More information on how to create an app configuration policy and enter XML data can be found at Add app configuration policies for managed iOS devices or for hybrid MDM, Apply settings to iOS apps with app configuration policies in System Center Configuration Manager.

    <dict>
        <key>IntuneCompanyPortalEnrollmentAfterUDA</key>
        <dict>
            <key>IntuneDeviceId</key>
            <string>{{deviceid}}</string>
            <key>UserId</key>
            <string>{{userid}}</string>
        </dict>
    </dict>
  3. Deploy the Company Portal to devices with the app configuration policy targeted to desired groups. Be sure to only deploy the policy to groups of devices that are already DEP enrolled.

  4. Tell end users to sign into the Company Portal app when it is automatically installed.

Monitor iOS app configuration status per device

Once a configuration policy has been assigned, you can monitor iOS app configuration status for each managed device. From Microsoft Intune in the Azure portal, select Devices > All devices. From the list of managed devices, select a specific device to display a blade for the device. On the device blade, select App configuration.

Additional information

Next steps

Continue to assign and monitor the app.