Enforcing macOS Platform SSO During Automated Device Enrollment (ADE)

Enforcing macOS Platform SSO During Automated Device Enrollment (ADE)

Historically, deploying Apple's Platform Single Sign-On (PSSO) framework via Microsoft Intune resulted in a disjointed post-onboarding experience. Users had to land on the desktop, wait for MDM background sync, launch Company Portal, and manually complete the identity-to-device registration loop.

With Microsoft's native integration of Platform SSO registration directly into Setup Assistant during Automated Device Enrollment (ADE), the identity registration and device-join flow occur natively at boot.

Here is the technical architecture, prerequisite stack, and configuration policy logic required to enforce this mechanism.

The Mechanics of Setup Assistant Registration

When a device is unboxed and initiates Apple ADE, the enrollment flow behaves as follows:

  1. Bootstrap Profile Delivery: The Mac reaches out to Apple's activation servers, is handed to Intune, and pulls down the initial MDM bootstrap payload, including the PSSO Settings Catalog policy.

  2. Prioritized LOB Pushing: Intune prioritizes the background installation of the Company Portal .pkg to provide the necessary com.microsoft.CompanyPortalMac Enterprise SSO plug-in payload before the user finishes setup.

  3. The Entra ID Handshake: During Setup Assistant, the user authenticates via Modern Authentication against Microsoft Entra ID. The system triggers the PSSO pane natively, issuing a hardware-backed Entra ID device registration certificate secured within the Mac's Secure Enclave.

  4. Account Provisioning: Based on your configuration, the local account is created using password synchronization mapped directly to the cloud identity service provider (IdP)

Technical Prerequisites
To execute this integrated deployment, you must meet the following baseline requirements:

  • Target OS: macOS 14 (Sonoma) or newer.

  • Enrollment Type: Automated Device Enrollment (ADE) via Apple Business Manager (ABM) or Apple School Manager (ASM).

  • Broker App: Intune Company Portal for macOS version 5.2604.0 or newer (deployed as a required Line-of-Business app).

  • Hardware: Apple Silicon ($M1/M2/M3/M4$) or Intel-based Macs equipped with a T2 Security Chip / Touch ID.

Intune Configuration Policy Stack

Enforcing PSSO inside Setup Assistant requires a precise orchestration of three distinct policy nodes assigned to the same static deployment groups.

1. The Platform SSO Settings Catalog Policy

Modify or create a Settings Catalog configuration under Devices > Manage devices > Configuration with the following key leaf nodes:

Configuration AreaSetting NameValueTechnical Context
Authentication > Extensible Single Sign OnEnable Registration During SetupEnabledTriggers the native PSSO configuration pane explicitly inside Apple's Setup Assistant.
Authentication > Extensible Single Sign OnEnable Create First User During SetupEnabled(Required only if using Password Auth) Synchronizes the cloud password payload down to the local account daemon during provisioning.
Authentication > Extensible Single Sign OnAuthentication MethodSecure EnclaveRecommended. Binds cryptographic keys to hardware for phishing-resistant credential flow.

2. The LOB Application Payload

Deploy the Company Portal installer (.pkg) as a Line-of-Business app. Ensure you strip out any irrelevant bundle IDs from the metadata properties, keeping exclusively:

  • com.microsoft.CompanyPortalMac

⚠️ Critical: Do not deploy Company Portal via shell scripts or alternative app management frameworks for this workflow. Intune requires the native LOB deployment engine to dynamically adjust delivery priority during the Await final configuration state.

3. The ADE Enrollment Profile

Navigate to Devices > Device onboarding > Enrollment > Apple enrollment and ensure your active ADE profile implements these specific management parameters:

  • User Affinity: Enroll with User Affinity

  • Authentication Method: Setup Assistant with modern authentication

  • Await Final Configuration: Yes (This holds the device in the Setup Assistant phase until the PSSO configuration profile and Company Portal LOB app are verified on the local disk volume).

Operational Impact & Identity Trust

By enforcing PSSO during registration, you effectively satisfy Zero Trust compliance verification and Conditional Access (CA) requirements the exact second the user reaches the macOS Finder. Because the identity is tightly coupled to the hardware keybag at provisioning, subsequent authentication checks treat the native device context as managed, trusted, and fully verified.

Comments

Popular posts from this blog

How to delete multiple devices at once on Intune

Troubleshooting CrowdStrike Falcon Issues on macOS 15: What’s Going On?

Office 365: Exploring the Differences Between Microsoft Office for Mac and Windows