Extensible Single Sign-on MDM payload settings for Apple devices
Use the Extensible Single Sign-on payload to define extensions for multifactor user authentication on an iPhone, iPad, or Mac enrolled in a mobile device management (MDM) solution.
This extension is for use by identity providers to deliver a seamless experience as users sign in to apps and websites. When properly configured using MDM, the user authenticates once then gains access to subsequent native apps and websites automatically. The following other features can be used with the Extensible Single Sign-On payload when implemented by the developer:
Per App VPN
In addition to providing the single sign-on extensions for third-party developers, iOS 13, iPadOS 13.1, and macOS 10.15 feature a built-in Kerberos extension that can be used to sign users in to native apps and websites that support Kerberos authentication.
The Extensible Single Sign-on payload supports the following. For more information, see Payload information.
Supported approval method: Requires user approval.
Supported installation method: Requires an MDM solution to install.
Supported payload identifier: com.apple.extensiblesso
Supported operating systems and channels: iOS, iPadOS, Shared iPad user, macOS device, macOS user.
Supported enrollment types: User Enrollment, Device Enrollment, Automated Device Enrollment.
Duplicates allowed: True—only one Extensible Single Sign-on payload can be delivered to a user or device.
You can use the settings in the table below with the Extensible Single Sign-on payload.
The unique bundle ID for the app.
The unique team ID for the app.
macOS 13 or later
The Platform SSO authentication method the extension uses. Requires that the SSO extension also support the method.
macOS 13 or later
The token this device uses for registration with Platform SSO. Use it for silent registration with the identity provider. Requires that Authentication Method not be empty.
The full Kerberos realm where the user’s account is located.
This key is ignored for Redirect payloads.
Approved domains that can be authenticated with the app extension.
Required for Redirect payloads. Ignored for Credential payloads.
The URLs must begin with https:// or http://, the scheme and hostname are matched case insensitively, query parameters and URL fragments aren’t allowed, and the URLs of all installed Extensible SSO payloads must be unique.
Note: Each MDM vendor implements these settings differently. To learn how various Extensible Single Sign-on settings are applied to your devices and users, consult your MDM vendor’s documentation.