Home
%3CLINGO-SUB%20id%3D%22lingo-sub-476091%22%20slang%3D%22en-US%22%3EMicrosoft%20Edge%20on%20iOS%20and%20Android%20now%20supports%20conditional%20access%20and%20single%20sign-on%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-476091%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Enterprise%20Mobility%20%2B%20Security%20(%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEMS%3C%2FA%3E)%20is%20excited%20to%20deliver%20conditional%20access%20protection%20for%20Microsoft%20Edge%20on%20iOS%20and%20Android.%20This%20integration%20expands%20your%20management%20capabilities%20as%20you%20deploy%20Microsoft%20Edge%20for%20the%20best%20browsing%20experience%20across%20all%20endpoints%20in%20the%20enterprise.%20Microsoft%20Edge%20on%20iOS%20and%20Android%20with%20conditional%20access%20gives%20users%20easy%2C%20secure%20access%20to%20Office%20365%20and%20all%20your%20web%20apps%20that%20use%20Azure%20Active%20Directory%2C%20with%20the%20same%20application%20management%20and%20security%20capabilities%20that%20previously%20required%20Intune%20Managed%20Browser.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20excited%20to%20share%20the%20following%20capabilities%20are%20now%20in%20public%20preview%20for%20Microsoft%20Edge%20on%20iOS%20and%20Android%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EMicrosoft%20Edge%20single%20sign-on%20(SSO)%3A%3C%2FSTRONG%3E%20Your%20employees%20can%20enjoy%20single%20sign-on%20across%20native%20clients%20(such%20as%20Microsoft%20Outlook)%20and%20Microsoft%20Edge%20for%20all%20Azure%20Active%20Directory%20connected%20apps.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EMicrosoft%20Edge%20conditional%20access%3C%2FSTRONG%3E%3A%20You%20can%20now%20require%20employees%20to%20use%20Microsoft%20Intune%20protected%20browsers%20such%20as%20Microsoft%20Edge%20using%20application-based%20conditional%20access%20policies.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet's%20dive%20a%20little%20deeper%20to%20explore%20these%20new%20features%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1708576344%22%20id%3D%22toc-hId-1708576344%22%20id%3D%22toc-hId-1708576344%22%20id%3D%22toc-hId-1708576344%22%20id%3D%22toc-hId-1708576344%22%20id%3D%22toc-hId-1708576344%22%3ESingle%20Sign-on%20to%20Azure%20AD-connected%20apps%20in%20Microsoft%20Edge%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Edge%20on%20iOS%20and%20Android%20can%20now%20take%20advantage%20of%20single%20sign-on%20(SSO)%20to%20all%20web%20apps%20(SaaS%20and%20on-premises)%20that%20are%20Azure%20AD-connected.%20This%20means%20users%20of%20Microsoft%20Edge%20will%20be%20able%20to%20access%20Azure%20AD-connected%20web%20apps%20without%20having%20to%20re-enter%20their%20credentials.%20They%20simply%20need%20to%20have%20the%20Microsoft%20Authenticator%20app%20on%20iOS%20or%20the%20Intune%20Company%20Portal%20app%20on%20Android.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet%E2%80%99s%20see%20how%20users%20can%20get%20this%20better%20sign-in%20experience%20on%20iOS%20devices%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EInstall%20the%20latest%20version%20of%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fwindows%2Fmicrosoft-edge-mobile%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Edge.%3C%2FA%3E%20If%20you%20don%E2%80%99t%20have%20Microsoft%20Authenticator%20installed%20yet%2C%20you%20will%20be%20prompted%20to%20download%20it.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109645i6E619FCB2B3D6847%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%2201%20Edge.jpg%22%20title%3D%2201%20Edge.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ESign-in%20and%20navigate%20to%20any%20of%20your%20Azure%20AD-connected%20applications%20that%20support%20single%20sign-on.%20You%20will%20be%20prompted%20to%20register%20your%20device%2C%20and%20that's%20it%20you%20will%20receive%20single%20sign-on%20access%20to%20all%20applications.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109640i6B07B62997F0BA60%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%2202%20Enroll.jpg%22%20title%3D%2202%20Enroll.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fmicrosoft-365%2Fblog%2F2018%2F03%2F15%2Fthe-intune-managed-browser-now-supports-azure-ad-sso-and-conditional-access%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epreviously%3C%2FA%3E%20used%20Intune%20Managed%20Browser%20with%20Azure%20AD%20Conditional%20Access%2C%20this%20new%20Microsoft%20Edge%20functionality%20will%20be%20familiar%20to%20you.%20Now%2C%20users%20protected%20with%20device-based%20conditional%20access%20can%20navigate%20to%20all%20links%20using%20Microsoft%20Edge%20from%20Outlook%20mobile%2C%20and%20access%20web%20resources%20without%20having%20to%20reauthenticate.%20To%20enable%20this%2C%20users%20only%20need%20to%20set%20Microsoft%20Edge%20as%20their%20default%20browser%20in%20their%20Outlook%20app%20settings.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109646i16F02A4B728F0106%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%2203%20outlook.jpg%22%20title%3D%2203%20outlook.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ESet%20default%20browser%20in%20Outlook%20settings%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--843580617%22%20id%3D%22toc-hId--843580617%22%20id%3D%22toc-hId--843580617%22%20id%3D%22toc-hId--843580617%22%20id%3D%22toc-hId--843580617%22%20id%3D%22toc-hId--843580617%22%3ESecure%20mobile%20browser%20access%20using%20Conditional%20Access%20and%20Microsoft%20Edge%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20now%20enforce%20policy-managed%20Microsoft%20Edge%20as%20the%20approved%20mobile%20browser%20to%20access%20Azure%20AD-connected%20web%20apps%2C%20restricting%20the%20use%20of%20unprotected%20browsers%20like%20Safari%20or%20Chrome.%20This%20allows%20you%20to%20secure%20access%20and%20prevent%20data%20leakage%20via%20unprotected%20browser%20applications.%20A%20similar%20protection%20can%20be%20applied%20to%20Office%20365%20services%20like%20Exchange%20Online%20and%20SharePoint%20Online%2C%20the%20Office%20portal%2C%20and%20access%20to%20on-premises%20(intranet)%20sites%20via%20the%20Azure%20AD%20Application%20Proxy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsers%20attempting%20to%20use%20unmanaged%20browsers%20such%20as%20Safari%20and%20Chrome%20will%20be%20prompted%20to%20open%20Microsoft%20Edge%20instead.%20On%20first%20attempt%2C%20users%20will%20be%20prompted%20to%20install%20the%20Microsoft%20Authenticator%20on%20iOS%20or%20the%20Intune%20Company%20Portal%20on%20Android.%20Here%20is%20a%20screenshot%20of%20a%20blocked%20access%20when%20using%20Safari%20on%20iOS.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20225px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109647iA7E3CF674DEED9D7%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%2204%20blocked.jpg%22%20title%3D%2204%20blocked.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ERequire%20approved%20mobile%20apps%20for%20security%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20configure%20this%20in%20Microsoft%20Intune%2C%20you%20need%20to%20apply%20application-based%20conditional%20access%20policy%20and%20an%20App%20Protection%20policy%20for%20Microsoft%20Edge%20on%20iOS%20and%20Android.%20Here%E2%80%99s%20how%20you%20do%20that%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECreate%20a%20conditional%20access%20policy%20to%20lock%20down%20browser%20access%20to%20a%20policy-protected%20browser%20such%20as%20Microsoft%20Edge%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fapp-based-conditional-access-intune-create%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eapp-based%20conditional%20access%3C%2FA%3E.%20Here%E2%80%99s%20a%20screenshot%20of%20a%20policy%20targeting%20browser%20access.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109648i78C88CECE3121BD3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%2204%20Browser%20CA.jpg%22%20title%3D%2204%20Browser%20CA.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EConfigure%20conditional%20access%20policies%20to%20target%20the%20browser%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20may%20then%20select%20the%20control%20to%20grant%20access%20to%20cloud%20resources%20only%20from%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fapp-based-conditional-access%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eapproved%20clients%20apps%3C%2FA%3E%20that%20can%20protect%20your%20corporate%20data.%26nbsp%3B%20%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20852px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109649i0F56E6AEACB51BB9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%2205%20Browser%20CA%20Grant.jpg%22%20title%3D%2205%20Browser%20CA%20Grant.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EConfigure%20conditional%20access%20policy%20to%20require%20approved%20apps%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECreate%20an%20Intune%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fapp-configuration-managed-browser%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eapplication%20protection%20policy%3C%2FA%3E%20and%20target%20all%20users%20for%20the%20%3CSTRONG%3EMicrosoft%20Edge%20%3C%2FSTRONG%3Eapplication.%20This%20screenshot%20shows%20how%20to%20target%20Microsoft%20Edge.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109650i7D6809298E1376EB%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%2206%20Intune%20APP%20Edge.jpg%22%20title%3D%2206%20Intune%20APP%20Edge.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EApply%20app%20protection%20policies%20to%20Microsoft%20Edge%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20conditional%20access%20and%20single%20sign-on%2C%20here%20are%20other%20features%20and%20benefits%20enjoyed%20by%20users%20of%20Microsoft%20Edge%20managed%20and%20protected%20by%20Microsoft%20EMS%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EDual-Identity%3A%20%3C%2FSTRONG%3EMicrosoft%20Edge%20now%20supports%20corporate%20and%20personal%20work%20identities.%20There%20is%20complete%20separation%20between%20the%20two%20identities%2C%20like%20the%20architecture%20and%20experience%20of%20Outlook%20and%20Office%20365.%20Users%20can%20seamlessly%20transition%20between%20work%20and%20personal%20identities%20while%20corporate%20content%20is%20kept%20secured.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EConfiguration%20settings%3A%20%3C%2FSTRONG%3EAdmins%20can%20configure%20a%20homepage%20shortcut%2C%20bookmarks%2C%20MyApps%20integration%2C%20Azure%20app%20proxy%2C%20allow%20and%20block%20URL%20lists%2C%20and%20more%20for%20Microsoft%20Edge.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EFast%20page-rendering%3A%20%3C%2FSTRONG%3EConsumers%20already%20love%20Microsoft%20Edge%2C%20and%20one%20thing%20we%20hear%20over%20and%20over%20is%20that%20they%20love%20how%20fast%20it%20is.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ERich%20set%20of%20personalization%20and%20productivity%20features%3A%20%3C%2FSTRONG%3EMicrosoft%20Edge%20comes%20with%20modern%20features%20such%20as%20seamless%20browsing%20across%20mobile%20and%20desktop%2C%20Voice%20Search%2C%20a%20built-in%20QR%20code%20reader%2C%20syncing%20capabilities%20to%20keep%20users%E2%80%99%20eBooks%2C%20passwords%2C%20and%20favorites%20shared%20across%20devices.%20Learn%20more%20about%20the%20first-class%20features%20built%20into%20Microsoft%20Edge%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fwindows%2Fmicrosoft-edge-mobile%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EGo%20ahead%20and%20download%20Microsoft%20Edge%20to%20experience%20these%20benefits%20today.%20Here%E2%80%99s%20a%20set%20of%20quick%20links%20to%20get%20you%20started%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Factive-directory-application-proxy-get-started%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20to%20use%20Azure%20AD%20Application%20Proxy%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fazureadca%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAuthoring%20conditional%20access%20policy%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Factive-directory-conditional-access-mam%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApp-based%20conditional%20access%20technical%20documentation%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fintune%2Fapp-protection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApp%20protection%20policies%20in%20Intune%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmanagedbrowser%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20Microsoft%20Edge%20policies%20in%20Intune%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%E2%80%99d%20love%20to%20hear%20any%20feedback%20or%20suggestions%20you%20have.%20Just%20email%20us%20%3CA%20href%3D%22mailto%3AEdgeCAFeedback%40microsoft.com%3Fsubject%3D%5BFeedback%5D%2520Edge%2520Conditional%2520Access%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20and%20let%20us%20know%20what%20you%20think!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFollow%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fmsintune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40MSIntune%3C%2FA%3E%26nbsp%3B%40%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fazuread%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzureAD%3C%2FA%3E%20and%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fmicrosoftedge%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40MicrosoftEdge%3C%2FA%3E%26nbsp%3Bon%20Twitter%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E(This%20post%20is%20authored%20in%20collaboration%20with%20Microsoft%20Intune%2C%20Azure%20Active%20Directory%20and%20Microsoft%20Edge%20product%20experts)%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-476091%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Enterprise%20Mobility%20%2B%20Security%20(%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EEMS%3C%2FA%3E)%20is%20excited%20to%20deliver%20Azure%20Active%20Directory%20conditional%20access%20protection%20for%20Microsoft%20Edge%20on%20iOS%20and%20Android.%20This%20integration%20expands%20the%20Microsoft%20Intune%20management%20capabilities%20as%20you%20deploy%20Microsoft%20Edge%20for%20the%20best%20browsing%20experience%20across%20all%20endpoints%20in%20the%20enterprise.%20Users%20get%20easy%2C%20secure%20access%20to%20Office%20365%20and%20all%20your%20web%20apps%20that%20use%20Azure%20Active%20Directory%2C%20with%20the%20same%20application%20management%20and%20security%20capabilities%20that%20previously%20required%20Intune%20Managed%20Browser.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-476091%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EConditional%20Access%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEnterprise%20Mobility%20%2B%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20and%20Access%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Intune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Device%20and%20App%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EUnified%20Endpoint%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-480503%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Edge%20on%20iOS%20and%20Android%20now%20supports%20conditional%20access%20and%20single%20sign-on%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-480503%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20article!%20Just%20a%20quick%20suggestion%20regarding%20the%26nbsp%3BSecure%20mobile%20browser%20access%20using%20Conditional%20Access%20and%20Microsoft%20Edge%3C%2FP%3E%0A%3CP%3EThe%20first%20conditional%20access%20screenshot%20shows%20%22Device%20Platforms%22%20configured%20as%20%22Any%20Device%22.%3C%2FP%3E%0A%3CP%3EGiven%20that%20this%20Conditional%20access%20is%20for%20browsers%20on%20iOS%20and%20Android%20I%20would%20suggest%20either%20replacing%20the%20screenshot%20with%20one%20that%20specifically%20includes%20those%20two%20platforms%20or%20adding%20another%20step%20to%20set%20the%20%22Device%20Platforms%22%20condition%20and%20chose%20iOS%20and%20Android%20as%20the%20selected%20device%20platforms.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-480825%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Edge%20on%20iOS%20and%20Android%20now%20supports%20conditional%20access%20and%20single%20sign-on%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-480825%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20Doug.%20Fixed%20the%20screenshot%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-481598%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Edge%20on%20iOS%20and%20Android%20now%20supports%20conditional%20access%20and%20single%20sign-on%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-481598%22%20slang%3D%22en-US%22%3E%3CP%3EGood%20news%2C%20but%20we%20would%20rather%20have%20seen%20that%20Seamless%20SSO%20was%20supported%20on%26nbsp%3BEdge%20for%20Windows%2010%20first.%20We%20would%20like%20to%20use%20the%20client%20but%20is%20still%20reverting%20to%20IE%20to%20allow%20domain%20joined%20users%20to%20have%20Seamless%20SSO%20via%20ADFS.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPs.%20We%20should%20not%20need%20to%20have%20the%20devices%20Azure%20AD%20joined%20to%20achieve%20something%20that%20is%20already%20supported%20on%20all%20other%20browsers%20for%20this%20very%20common%20AD%20configuration.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMany%20thanks!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EReference%201%20(known%20issue)%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fhybrid%2Ftshoot-connect-sso%23known-issues%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fhybrid%2Ftshoot-connect-sso%23known-issues%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EReference%202%20(not%20supported)%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-gb%2Fazure%2Factive-directory%2Fhybrid%2Fhow-to-connect-sso%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-gb%2Fazure%2Factive-directory%2Fhybrid%2Fhow-to-connect-sso%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-825862%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Edge%20on%20iOS%20and%20Android%20now%20supports%20conditional%20access%20and%20single%20sign-on%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-825862%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F114887%22%20target%3D%22_blank%22%3E%40Mayunk%20Jain%3C%2FA%3E%26nbsp%3BQuestion%20is%20related%20to%20support%20of%20dual%20identity%20on%20same%20browser%20and%20restricted%20paste%20in%20-%20Intune%20App%20protection%20policy.%3C%2FP%3E%0A%3CP%3EWhen%20I%20open%20my%20corporate%20data%20and%20personal%20email%20account%20on%20same%20edge%20browser%20in%20different%20tab%2C%20how%20can%20we%20restrict%20the%20copy%20paste%20from%20corporate%20to%20personal%20email.%20In%20trial%20we%20couldn't%20restrict%20paste%20out.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

 

 

Microsoft Enterprise Mobility + Security (EMS) is excited to deliver conditional access protection for Microsoft Edge on iOS and Android. This integration expands your management capabilities as you deploy Microsoft Edge for the best browsing experience across all endpoints in the enterprise. Microsoft Edge on iOS and Android with conditional access gives users easy, secure access to Office 365 and all your web apps that use Azure Active Directory, with the same application management and security capabilities that previously required Intune Managed Browser.

 

We are excited to share the following capabilities are now in public preview for Microsoft Edge on iOS and Android:

  • Microsoft Edge single sign-on (SSO): Your employees can enjoy single sign-on across native clients (such as Microsoft Outlook) and Microsoft Edge for all Azure Active Directory connected apps.
  • Microsoft Edge conditional access: You can now require employees to use Microsoft Intune protected browsers such as Microsoft Edge using application-based conditional access policies.

 

Let's dive a little deeper to explore these new features

 

Single Sign-on to Azure AD-connected apps in Microsoft Edge

 

Microsoft Edge on iOS and Android can now take advantage of single sign-on (SSO) to all web apps (SaaS and on-premises) that are Azure AD-connected. This means users of Microsoft Edge will be able to access Azure AD-connected web apps without having to re-enter their credentials. They simply need to have the Microsoft Authenticator app on iOS or the Intune Company Portal app on Android.

 

Let’s see how users can get this better sign-in experience on iOS devices:

  • Install the latest version of Microsoft Edge. If you don’t have Microsoft Authenticator installed yet, you will be prompted to download it.01 Edge.jpg

     

 

  • Sign-in and navigate to any of your Azure AD-connected applications that support single sign-on. You will be prompted to register your device, and that's it you will receive single sign-on access to all applications.

02 Enroll.jpg

 

If you previously used Intune Managed Browser with Azure AD Conditional Access, this new Microsoft Edge functionality will be familiar to you. Now, users protected with device-based conditional access can navigate to all links using Microsoft Edge from Outlook mobile, and access web resources without having to reauthenticate. To enable this, users only need to set Microsoft Edge as their default browser in their Outlook app settings.

03 outlook.jpgSet default browser in Outlook settings

 

Secure mobile browser access using Conditional Access and Microsoft Edge

 

You can now enforce policy-managed Microsoft Edge as the approved mobile browser to access Azure AD-connected web apps, restricting the use of unprotected browsers like Safari or Chrome. This allows you to secure access and prevent data leakage via unprotected browser applications. A similar protection can be applied to Office 365 services like Exchange Online and SharePoint Online, the Office portal, and access to on-premises (intranet) sites via the Azure AD Application Proxy.

 

Users attempting to use unmanaged browsers such as Safari and Chrome will be prompted to open Microsoft Edge instead. On first attempt, users will be prompted to install the Microsoft Authenticator on iOS or the Intune Company Portal on Android. Here is a screenshot of a blocked access when using Safari on iOS.

04 blocked.jpgRequire approved mobile apps for security

 

To configure this in Microsoft Intune, you need to apply application-based conditional access policy and an App Protection policy for Microsoft Edge on iOS and Android. Here’s how you do that:

 

Create a conditional access policy to lock down browser access to a policy-protected browser such as Microsoft Edge using app-based conditional access. Here’s a screenshot of a policy targeting browser access.04 Browser CA new.jpg

 

You may then select the control to grant access to cloud resources only from approved clients apps that can protect your corporate data.  05 Browser CA Grant.jpgConfigure conditional access policy to require approved apps

 

 

Create an Intune application protection policy and target all users for the Microsoft Edge application. This screenshot shows how to target Microsoft Edge.

06 Intune APP Edge.jpgApply app protection policies to Microsoft Edge

 

 

In addition to conditional access and single sign-on, here are other features and benefits enjoyed by users of Microsoft Edge managed and protected by Microsoft EMS:

  • Dual-Identity: Microsoft Edge now supports corporate and personal work identities. There is complete separation between the two identities, like the architecture and experience of Outlook and Office 365. Users can seamlessly transition between work and personal identities while corporate content is kept secured.
  • Configuration settings: Admins can configure a homepage shortcut, bookmarks, MyApps integration, Azure app proxy, allow and block URL lists, and more for Microsoft Edge.
  • Fast page-rendering: Consumers already love Microsoft Edge, and one thing we hear over and over is that they love how fast it is.
  • Rich set of personalization and productivity features: Microsoft Edge comes with modern features such as seamless browsing across mobile and desktop, Voice Search, a built-in QR code reader, syncing capabilities to keep users’ eBooks, passwords, and favorites shared across devices. Learn more about the first-class features built into Microsoft Edge here.

 

Go ahead and download Microsoft Edge to experience these benefits today. Here’s a set of quick links to get you started:

 

As always, we’d love to hear any feedback or suggestions you have. Just email us here and let us know what you think!

 

Follow @MSIntune @AzureAD and @MicrosoftEdge on Twitter

 

(This post is authored in collaboration with Microsoft Intune, Azure Active Directory and Microsoft Edge product experts)

4 Comments
Microsoft

Great article! Just a quick suggestion regarding the Secure mobile browser access using Conditional Access and Microsoft Edge

The first conditional access screenshot shows "Device Platforms" configured as "Any Device".

Given that this Conditional access is for browsers on iOS and Android I would suggest either replacing the screenshot with one that specifically includes those two platforms or adding another step to set the "Device Platforms" condition and chose iOS and Android as the selected device platforms.

Microsoft

Thanks Doug. Fixed the screenshot

Contributor

Good news, but we would rather have seen that Seamless SSO was supported on Edge for Windows 10 first. We would like to use the client but is still reverting to IE to allow domain joined users to have Seamless SSO via ADFS.

 

Ps. We should not need to have the devices Azure AD joined to achieve something that is already supported on all other browsers for this very common AD configuration.

 

Many thanks!

 

Reference 1 (known issue): https://docs.microsoft.com/en-us/azure/active-directory/hybrid/tshoot-connect-sso#known-issues

 

Reference 2 (not supported): https://docs.microsoft.com/en-gb/azure/active-directory/hybrid/how-to-connect-sso

 

 

@Mayunk Jain Question is related to support of dual identity on same browser and restricted paste in - Intune App protection policy.

When I open my corporate data and personal email account on same edge browser in different tab, how can we restrict the copy paste from corporate to personal email. In trial we couldn't restrict paste out.