Home
%3CLINGO-SUB%20id%3D%22lingo-sub-988179%22%20slang%3D%22en-US%22%3EMicrosoft%20Edge%20Mobile%20Support%20for%20Conditional%20Access%20and%20Single%20Sign-on%20Now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-988179%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EBy%20Ileana%20Wu%20%7C%20Intune%20PM%20and%20Shantaram%20Punukollu%20%7C%20Identity%20Sr.%20PM%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBack%20in%20April%2C%20Microsoft%20Enterprise%20Mobility%20%2B%20Security%20announced%20that%20conditional%20access%20protection%20and%20single%20sign-on%20for%20Microsoft%20Edge%20on%20iOS%20and%20Android%20was%20in%20public%20preview.%20Since%20then%2C%20we%E2%80%99ve%20had%20great%20customer%20success%20in%20deploying%20this%20functionality%20to%20protect%20their%20environments%2C%20and%20we%20are%20excited%20to%20call%20this%20functionality%20generally%20available.%20As%20we%20wrote%20back%20in%20April%2C%20this%20integration%20expands%20your%20management%20capabilities%20as%20you%20deploy%20Microsoft%20Edge.%20Microsoft%20Edge%20on%20iOS%20and%20Android%20with%20conditional%20access%20gives%20users%20easy%2C%20secure%20access%20to%20Office%20365%20and%20all%20your%20web%20apps%20that%20use%20Azure%20Active%20Directory%2C%20with%20the%20same%20application%20management%20and%20security%20capabilities%20that%20previously%20required%20Intune%20Managed%20Browser.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20recap%2C%20these%20functionalities%20are%20now%20generally%20available%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EMicrosoft%20Edge%20single%20sign-on%20(SSO)%3A%3C%2FSTRONG%3E%20Your%20employees%20can%20enjoy%20single%20sign-on%20across%20native%20clients%20(such%20as%20Microsoft%20Outlook)%20and%20Microsoft%20Edge%20for%20all%20Azure%20Active%20Directory%20connected%20apps.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EMicrosoft%20Edge%20conditional%20access%3C%2FSTRONG%3E%3A%20You%20can%20now%20require%20that%20employees%20use%20Microsoft%20Intune%20protected%20browsers%20such%20as%20Microsoft%20Edge%20using%20application-based%20conditional%20access%20policies.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIf%20you%E2%80%99d%20like%20more%20details%20about%20conditional%20access%20and%20SSO%20with%20Microsoft%20Edge%2C%20visit%20our%20previous%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FEnterprise-Mobility-Security%2FMicrosoft-Edge-on-iOS-and-Android-now-supports-conditional%2Fba-p%2F476091%22%20target%3D%22_self%22%3Eblog%20post%3C%2FA%3E%20where%20we%20announced%20the%20integration.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20have%20not%20yet%20deployed%20Microsoft%20Edge%20mobile%20for%20your%20environment%2C%20here%20is%20a%20set%20of%20quick%20links%20to%20get%20you%20started%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Factive-directory-application-proxy-get-started%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20to%20use%20Azure%20AD%20Application%20Proxy%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fazureadca%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAuthoring%20conditional%20access%20policy%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Factive-directory-conditional-access-mam%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApp-based%20conditional%20access%20technical%20documentation%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fintune%2Fapp-protection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApp%20protection%20policies%20in%20Intune%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmanagedbrowser%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20Microsoft%20Edge%20policies%20in%20Intune%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%E2%80%99d%20love%20to%20hear%20any%20feedback%20or%20suggestions%20you%20have.%20Just%20email%20us%20%3CA%20href%3D%22mailto%3AEdgeCAFeedback%40microsoft.com%3Fsubject%3D%5BFeedback%5D%2520Edge%2520Conditional%2520Access%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20and%20let%20us%20know%20what%20you%20think%20about%20Microsoft%20Edge%20conditional%20access!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFollow%20%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fmsintune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40MSIntune%3C%2FA%3E%20%40%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fazuread%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzureAD%3C%2FA%3E%20%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fmicrosoftedge%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40MicrosoftEdge%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fintunesuppteam%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40Intunesuppteam%3C%2FA%3E%20on%20Twitter.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E(This%20post%20is%20authored%20in%20collaboration%20with%20Microsoft%20Intune%2C%20Azure%20Active%20Directory%20and%20Microsoft%20Edge%20product%20experts).%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-988179%22%20slang%3D%22en-US%22%3E%3CP%3EC%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3Eonditional%20access%20protection%20and%20single%20sign-on%20for%20Microsoft%20Edge%20on%20iOS%20and%20Android%20including%20Microsoft%20Edge%20single%20sign-on%20and%20Microsoft%20Edge%20conditional%20access%20out%20of%20public%20preview!%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-988179%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EConditional%20Access%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Edge%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1016437%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Edge%20Mobile%20Support%20for%20Conditional%20Access%20and%20Single%20Sign-on%20Now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1016437%22%20slang%3D%22en-US%22%3E%3CDIV%20class%3D%22lia-note-subject%20lia-component-subject%22%3E%3CDIV%20class%3D%22NoteListSubjectCell%20message-subject%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fnotes%2Fprivatenotespage%2Ftab%2Foutbox%2Fnotes-view-mode%2Fsingle%2Fnote-id%2F145202%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ENo%20Compliance%20policy%20have%20been%20assigned%2C%20your%20IT%20department%20has%20not%20configured%20your%20device%3C%2FA%3E%3C%2FDIV%3E%3C%2FDIV%3E%3CDIV%20class%3D%22lia-note-body%20lia-note-body-truncated%20lia-component-body-nohtml%22%3EGood%20day%20i%20have%20a%20user%20that%20have%20tried%20two%20devices%20iphone%205%20and%20iphone7%20and%20getting%20the%20same%20error%20on%20both%20her%20devices%20when%20trying%20to%20setup%20ad%20in%20Intune%20can%20someone%20assist%20in%20telling%20me%20why%20the%20user%20is%20getting%20the%20same%20err%20r%20on%20two%20different%20device%26nbsp%3B%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1018632%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Edge%20Mobile%20Support%20for%20Conditional%20Access%20and%20Single%20Sign-on%20Now%20Generally%20Available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1018632%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F461579%22%20target%3D%22_blank%22%3E%40ryanarries%3C%2FA%3E%2C%20you've%20also%20sent%20us%20a%20message%20regarding%20the%20same.%20Be%20on%20the%20lookout%20for%20our%20response.%3C%2FP%3E%0A%3CP%3EHowever%20-%26nbsp%3BIf%20an%20end%20user%20isn't%20compliant%20because%20a%20policy%20isn't%20assigned%2C%20then%20the%20Company%20Portal%20app%20shows%20No%20compliance%20policies%20have%20been%20assigned.%3C%2FP%3E%0A%3CP%3EHave%20you%20validated%20that%20the%20impacted%20user%20has%20a%20compliance%20policy%20assigned%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E

By Ileana Wu | Intune PM and Shantaram Punukollu | Identity Sr. PM

 

Back in April, Microsoft Enterprise Mobility + Security announced that conditional access protection and single sign-on for Microsoft Edge on iOS and Android was in public preview. Since then, we’ve had great customer success in deploying this functionality to protect their environments, and we are excited to call this functionality generally available. As we wrote back in April, this integration expands your management capabilities as you deploy Microsoft Edge. Microsoft Edge on iOS and Android with conditional access gives users easy, secure access to Office 365 and all your web apps that use Azure Active Directory, with the same application management and security capabilities that previously required Intune Managed Browser.

 

To recap, these functionalities are now generally available:

  • Microsoft Edge single sign-on (SSO): Your employees can enjoy single sign-on across native clients (such as Microsoft Outlook) and Microsoft Edge for all Azure Active Directory connected apps.
  • Microsoft Edge conditional access: You can now require that employees use Microsoft Intune protected browsers such as Microsoft Edge using application-based conditional access policies.

If you’d like more details about conditional access and SSO with Microsoft Edge, visit our previous blog post where we announced the integration.

 

If you have not yet deployed Microsoft Edge mobile for your environment, here is a set of quick links to get you started:

 

As always, we’d love to hear any feedback or suggestions you have. Just email us here and let us know what you think about Microsoft Edge conditional access!

 

Follow @MSIntune @AzureAD @MicrosoftEdge and @Intunesuppteam on Twitter.

 

(This post is authored in collaboration with Microsoft Intune, Azure Active Directory and Microsoft Edge product experts).

2 Comments
Visitor
Good day i have a user that have tried two devices iphone 5 and iphone7 and getting the same error on both her devices when trying to setup ad in Intune can someone assist in telling me why the user is getting the same err r on two different device 

Hi @ryanarries, you've also sent us a message regarding the same. Be on the lookout for our response.

However - If an end user isn't compliant because a policy isn't assigned, then the Company Portal app shows No compliance policies have been assigned.

Have you validated that the impacted user has a compliance policy assigned?