Enforcing macOS Platform SSO During Automated Device Enrollment (ADE)
Enforcing macOS Platform SSO During Automated Device Enrollment (ADE)
Historically, deploying Apple's Platform Single Sign-On (PSSO) framework via Microsoft Intune resulted in a disjointed post-onboarding experience. Users had to land on the desktop, wait for MDM background sync, launch Company Portal, and manually complete the identity-to-device registration loop.
With Microsoft's native integration of Platform SSO registration directly into Setup Assistant during Automated Device Enrollment (ADE), the identity registration and device-join flow occur natively at boot.
Here is the technical architecture, prerequisite stack, and configuration policy logic required to enforce this mechanism.
When a device is unboxed and initiates Apple ADE, the enrollment flow behaves as follows:
Bootstrap Profile Delivery: The Mac reaches out to Apple's activation servers, is handed to Intune, and pulls down the initial MDM bootstrap payload, including the PSSO Settings Catalog policy.
Prioritized LOB Pushing: Intune prioritizes the background installation of the Company Portal
.pkgto provide the necessarycom.microsoft.CompanyPortalMacEnterprise SSO plug-in payload before the user finishes setup.The Entra ID Handshake: During Setup Assistant, the user authenticates via Modern Authentication against Microsoft Entra ID. The system triggers the PSSO pane natively, issuing a hardware-backed Entra ID device registration certificate secured within the Mac's Secure Enclave.
Account Provisioning: Based on your configuration, the local account is created using password synchronization mapped directly to the cloud identity service provider (IdP)
Technical PrerequisitesTo execute this integrated deployment, you must meet the following baseline requirements:
Target OS: macOS 14 (Sonoma) or newer.
Enrollment Type: Automated Device Enrollment (ADE) via Apple Business Manager (ABM) or Apple School Manager (ASM).
Broker App: Intune Company Portal for macOS version 5.2604.0 or newer (deployed as a required Line-of-Business app).
Hardware: Apple Silicon ($M1/M2/M3/M4$) or Intel-based Macs equipped with a T2 Security Chip / Touch ID.
Intune Configuration Policy Stack
Enforcing PSSO inside Setup Assistant requires a precise orchestration of three distinct policy nodes assigned to the same static deployment groups.
1. The Platform SSO Settings Catalog Policy
Modify or create a Settings Catalog configuration under Devices > Manage devices > Configuration with the following key leaf nodes:
| Configuration Area | Setting Name | Value | Technical Context |
| Authentication > Extensible Single Sign On | Enable Registration During Setup | Enabled | Triggers the native PSSO configuration pane explicitly inside Apple's Setup Assistant. |
| Authentication > Extensible Single Sign On | Enable Create First User During Setup | Enabled | (Required only if using Password Auth) Synchronizes the cloud password payload down to the local account daemon during provisioning. |
| Authentication > Extensible Single Sign On | Authentication Method | Secure Enclave | Recommended. Binds cryptographic keys to hardware for phishing-resistant credential flow. |
2. The LOB Application Payload
Deploy the Company Portal installer (.pkg) as a Line-of-Business app. Ensure you strip out any irrelevant bundle IDs from the metadata properties, keeping exclusively:
com.microsoft.CompanyPortalMac
⚠️ Critical: Do not deploy Company Portal via shell scripts or alternative app management frameworks for this workflow. Intune requires the native LOB deployment engine to dynamically adjust delivery priority during theAwait final configurationstate.
3. The ADE Enrollment Profile
Navigate to Devices > Device onboarding > Enrollment > Apple enrollment and ensure your active ADE profile implements these specific management parameters:
User Affinity: Enroll with User Affinity
Authentication Method: Setup Assistant with modern authentication
Await Final Configuration: Yes (This holds the device in the Setup Assistant phase until the PSSO configuration profile and Company Portal LOB app are verified on the local disk volume).
Operational Impact & Identity Trust
By enforcing PSSO during registration, you effectively satisfy Zero Trust compliance verification and Conditional Access (CA) requirements the exact second the user reaches the macOS Finder. Because the identity is tightly coupled to the hardware keybag at provisioning, subsequent authentication checks treat the native device context as managed, trusted, and fully verified.
Comments
Post a Comment