Setup Assistant with modern authentication for ADE - Intune Public Preview

Published Apr 20 2021 08:00 AM 13.8K Views

Updated 8/27/21: We're excited to take the preview tag off and share that Setup Assistant with modern authentication for ADE (iOS/iPadOS 13+ and macOS 10.15+) is now generally available! See Automatically enroll iOS/iPadOS devices by using Apple's Automated Device Enrollment on how to use this authentication method on iOS/iPadOS devices, and Automatically enroll macOS devices with the Apple Business Manager or Apple School Manager for macOS devices.

 

We’re excited to announce support for a new authentication method for Apple's Automated Device Enrollment (ADE) which is Setup Assistant with modern authentication. This new authentication method is available for iOS/iPadOS devices running 13.0 and later and for macOS devices running 10.15 and later, in public preview in Microsoft Endpoint Manager.

 

For automated device enrollment scenarios where the authentication method is Setup Assistant with modern authentication, you can create a filter rule based on the enrollment profile name (enrollmentProfileName). See: Using filters with Setup Assistant with modern auth for ADE for corporate iOS/iPadOS/macOS devices to learn more.

 

Overview

When creating an ADE enrollment profile, you can choose a new authentication method: Setup Assistant with modern authentication. This authentication method for ADE allows your organization to require authentication with Azure Active Directory (Azure AD) in an out-of-box experience (OOBE) during enrollment with Setup Assistant, prior to users accessing the home screen. You have the option to also require multi-factor authentication (MFA) depending on the settings in your Conditional Access policy.

 

Users are required to authenticate with their Azure AD credentials twice: once during enrollment with Setup Assistant, and then again when they sign in to the Company Portal. After initial authentication with Azure AD during Setup Assistant, the home screen appears, and users can freely use the device for resources not protected by Conditional Access. User affinity is established when a user arrives at the home screen after the setup screens. However, the device will not show in a user's device list in the Azure AD portal until the user signs in to Company Portal. The additional sign in to the Company Portal app fully completes a device’s Azure AD registration and gives the user access to corporate resources protected by Conditional Access. This method provides all the security of authenticating with the Company Portal but doesn’t make users wait until the Company Portal installs on the device before they can start using it.

 

The correct Company Portal version will automatically be delivered as a required app to the device for iOS/iPadOS. We recommend choosing a Volume Purchase Program (for the enrollment profile. Otherwise, it will be delivered when the user sets up their Apple ID during the Setup Assistant screens. To learn how to get the Company Portal on macOS devices, see Add the Company Portal for macOS app.

 

Company Portal Redirection

A new improvement we’ve made to our onboarding experience helps guide users to complete that second Azure AD authentication by automatically redirecting to the iOS/iPadOS Company Portal when the user attempts to access corporate data.


If users open any managed iOS/iPadOS applications that are protected by Conditional Access and they haven't completed the additional Azure AD sign in to the iOS/iPadOS Company Portal, they will be redirected to the Company Portal from those other apps as part of this new change. This way, users are guided to complete that last step before they can access resources protected by Conditional Access.


Here is what it will look like if a user tries to open an app protected by Conditional Access before authenticating in the Company Portal:

 

Conditional Access block screen.Conditional Access block screen.

 

System prompt that opens the iOS/iPadOS Intune Company Portal.System prompt that opens the iOS/iPadOS Intune Company Portal.

 

Configuration in Microsoft Endpoint Manager admin center

The Intune documentation explains how to configure the Setup Assistant with Modern Authentication for iOS/iPadOS device enrollment and macOS device enrollment. In the Microsoft Endpoint Manager admin center, you can a user for multi-factor authentication. For instructions, see Require multi-factor authentication for Intune device enrollments. The following screenshot provides an example of the prompt locations:

 

MFA prompt locations for Microsoft Intune and Microsoft Intune Enrolment.MFA prompt locations for Microsoft Intune and Microsoft Intune Enrolment.

 

Enrolling devices with user device affinity but without Azure AD registration

For both iOS/iPadOS and macOS, user device affinity (also known as primary user) in Intune is established when a user lands on the home screen after the Setup Assistant screens. However, the device is not fully registered with Azure AD until the additional sign in to Company Portal, as mentioned above. This is also when device compliance is assessed, and the device shows as compliant in the Microsoft Endpoint Manager admin center. However, if you would like to keep devices fully enrolled with Intune but without Azure AD registration, this is also supported.

After the user completes the initial Azure AD sign in during Setup Assistant, if there are no resources protected by Conditional Access and if Azure AD registration is not required, then this authentication method can be used to fully enroll the device. If you choose this ADE flow, which does not require users to sign in to the Company Portal post enrollment, you will see the following device behavior:

  • The device will not show up in a user’s device list in the Azure AD portal (since there is no device identity association within Azure AD).

  • The device will not show up as compliant in the Microsoft Endpoint Manager admin center.

 

Keep in my mind

  • When enrolling an iOS/iPadOS device with Setup Assistant with Modern Authentication, app configuration policies are automatically applied to the iOS/iPadOS device. Don’t send a separate app configuration policy to the Company Portal for those iOS/iPadOS devices or it will result in an error.

  • If you choose Setup assistant with Modern Authentication as the authentication method for a device that is not running the correct software version, users will fall back to the legacy Setup Assistant ADE flow.

  • For iOS/iPadOS, we recommend selecting to install the Company Portal app from a VPP token in the enrollment profile. When VPP is used, the application can be downloaded and installed without user interaction. When VPP isn't used, an Apple ID is required to install the application. If the user doesn't sign in to an Apple ID during Setup Assistant, they will be prompted to sign in when Intune attempts to install the Company Portal.

 

Let us know if you have any questions by commenting on this post or reaching out to @IntuneSuppTeam on Twitter.

 

Post updates:
8/20/21 - added post on using filters with Setup Assistant with modern auth for ADE for corporate iOS/iPadOS/macOS devices.

8/26/21 - we're excited to take the preview tag off and share that Setup Assistant with modern authentication for ADE (iOS/iPadOS 13+ and macOS 10.15+) is now generally available! 

30 Comments
Occasional Visitor

I am trying this out on an iPad, the modern auth is working in the setup assistant and the device gets a management profile applied in this process/

 

However, from the launcher using 'comp portal' shows the device as not enrolled and tries to download a new management profile from the workflow, the profile downloads and fails to install and the device doesn't end up compliant as a result.

 

Not sure if it is intentional to have the device try to get a new management profile after it already has one applied from the setup assistant.

Occasional Contributor

Hi all,
I also experienced the same issue and this exprience is similar like when you set-up an enrollment profile without user affinity then try to enroll the device linked to this profile.


I'll describe here the user experience to help everyone understand well.

 

// User experience

Language > Country/Region > Network > Device activation + Getting settings > Remote Management > Gettings settings from "Company Name" > Passcode > ...

Note: Gettings settings from "Company Name" means that the device get ADE settings from Intune so the first Management profile is dowloaded and applied here.

 

After the company portal is installed and the user start the device enrollment, another Management profile is also downloaded and this one cannot be installed due to conflict.

 

I hope all those scenarios will find solutions.

cc: @Intune Support Team 

 

Regards,

AEL

Occasional Visitor

I have made some progress.

 

Under DEP Profile, tenant admin > customization, I changed this setting 'Device enrollment' to 'Available, no prompts' from 'Available, with Prompts'. Additionally, I removed my own account as an enrollment manager.

 

With these two steps removed the additional profile download is no longer occurring. In "Comp Portal" under 'Devices' it displays says "Register this device" for my iPad, but otherwise compliant with policies and the iPad is shown in the endpoint manager and I am able to use functions from there on the device.

 

Let us know if any of this is expected,

 

Thanks,

Hi @kpax-io and @Aldo ELIAS, thank you for your feedback! It's helpful for us while this feature is in public preview and we work through issues that are found. We will take this issue back to the team to investigate. At the point of signing into the Company Portal, the device is already enrolled and there should not be an additional management profile coming down. While we don't have a specific fix right now, please make sure you are not sending down any app config policies targeted at the iOS/iPadOS Company Portal app if enrolling your device with setup assistant with modern authentication for iOS/iPadOS. For iOS/iPadOS, the correct app config is already being applied automatically behind the scenes in the enrollment profile, so no app config is needed for the iOS/iPadOS Company Portal. Sending down an additional app config in this case may result in an error. We’ll keep this post updated as we learn more. Thanks!

New Contributor

@Intune Support Team  Thankyou for sharing the feature update. Definitely this is exciting and adds a lot of benefits. 

 

Would like to share the observations that, once the device lands home screen and Company portal is installed the device checks in automatically and device records is created on MEM console and the device is marked complaint without having to manually login to Company portal .

Note- the articles described that CP login is required once the device lands home screen to access CA protected apps. 

 

When (date) Setup Assistant with Modern Auth will be Generally available?
what is the risk in testing this feature in Production devices.. anything specific we need to be careful of?

Occasional Contributor

Hi @gokulansubramani,

Only your context of your company can help you for this kind of decision.

I recommend to test using spare devices and if you feel confident to try with production devices you accept the risk of enhancement or changes after the product team change something. You also have to consider your rollback capabilities and your business impact for each scenarios.

 

@Intune Support Team  can also advise

 

BR,

AEL 

Hi @gokulansubramani, thanks for the comment! Though we don't have any ETAs to currently share, stay tuned to this post for any future updates as well as our In development and What's new docs for new announcements regarding this feature.

 

Adding on to @Aldo ELIAS's comment, you may want to start with a pilot or test group before rolling this feature to your environment. After a successful pilot, you're ready to start a full production rollout. For more info on user/device targeting, see: add groups to organize users and devices to learn more. Hope this helps!

New Contributor

I started using the "Setup Assistant with modern authentication (preview)" and it seems to work well and the process works as expected.

 

I did run into an issue when trying to enroll a device using a DEM account following the same process, enrollment profile.

 

Once the Company Portal setup starts, I get a "There isn't a device setup for this account yet" error and it does not allow me to proceed, thus device does not register.

 

Anyone else having the same issue?

Occasional Contributor

Hi,

 

When will MS support MFA durin ADE?
Right now if we have MFA requirments during Intune enrollment with Setup assistant with Modern auth, user are stuck to move on IF they dont have a second device to configure MFA on?

Is there any plan on creating cloud app "Company portal" where you can choose to set MFA requirement during Company portal sign in instead during setup assistant?

 

That will help us move forward with our ADE solution that requires MFA.

Hi @Joel Gonzalez, thanks for the feedback!

There are a few limitations of devices that are enrolled with a DEM account and would like to share that DEM accounts cannot be used when enrolling devices via Apple's Automated Device Enrollment (ADE). See: Enroll devices using a device enrollment manager account to learn more about current limitations.

If you continue to experience the same "There isn't a device setup for this account yet" error not working as expected, let’s get you over to our support folks for further investigation. Please open a support request from within the Help + support blade, or any of the methods here. Once created, feel free message us with your support case number so that we can have an eye on the case. Thanks!

Hi @Roiit, today you can require MFA during enrollment with Setup Assistant and during CP login, or just during enrollment with Setup Assistant, but not only during Company Portal login. We appreciate your feedback and have captured this and shared it with the appropriate folks.

If you’ve configured a Conditional Access policy to require multi-factor authentication (MFA), then the user will need a second device to complete MFA as the primary device cannot be used for anything else while it is being provisioned (e.g. reviewing a phone call or text).

Re: Cloud Apps – See section “Configuration in Microsoft Endpoint Manager admin center” in our post above for more information on using different cloud apps in your conditional access policies. No current plans to make the Company Portal a cloud app for MFA upon CP login only, but keep an eye out on our In development and What’s new docs for new features coming to Intune. Thanks!

New Contributor

@Intune Support Team I reported the issue because it only happens when using Setup with Modern Authentication, not via the normal method of Company Portal as authentication. I do have a ticket open - 25759813 - and we have not been able to determine what the issue is.

Occasional Contributor

Hi @Joel Gonzalez,

 

What do you think about setup MFA exception for Intune enrollment service ?
Maybe it can help you avoid this kind of issue ?

 

cc @Intune Support Team 

 

Regards,

AEL

New Contributor

@Aldo ELIAS my only issue seems to happen when using Setup with Modern Authentication and then trying to register the device with a DEM account. I get the error mentioned above, but if I use Company Portal (legacy) as the authentication method instead the same device will enroll fine with a DEM account. 

Occasional Contributor

@Joel Gonzalezis your DEM account with MFA enabled / Enforced ?

Did you try to check the device logs ?

 

I don't have any idea so I can try to experience your situation but not possible before 1 week on my side.

New Contributor

@Aldo ELIAS no, DEM account does not have MFA enabled.

 

I reverted to the (Legacy) Setup and everything worked fine, but I would like to use the Setup with Modern Authentication eventually.

 

No one seems to know what the error means, which baffles me. I provided the diagnostic logs on my MS ticket to the thech working on it, but did not get it resolved.

Senior Member

@Intune Support Team  According to MC284343 this is now GA.  I tested this myself and experienced the same as the first 2 posters about an additional device management profile now tries to download.  We don't really have a simple Intune Environment and have heavily locked down DEP devices that have no apple id on them.  As I tested the following:
Changed the enrollment profile to:
Authentication Method: Setup Assistant w/ Modern Auth

Install company portal with VPP: Token specified.

 

Device was wiped from the intune console.  Upon going through the setup assistant everything went ok, eventually some apps started to deploy to the device.  Company portal didn't install until 30 minutes later along with the rest of our deployed apps, based of an Azure function app which moves devices to device based azure groups to separate out device types.  At this time I tried to open Outlook, which I believe it stated the device needed to be registered, added to Authenticator, then proceeded to open CP.  At this time it downloaded another device management profile, which can't be installed.  I only have the CP deployed to a device based group but there is no app config policy for it.  Same issue as the above posters.

Visitor

Hello,

 

I was having the same issue as Jason, Aldo and other with the Company Portal downloading a second management profile after ADE enrollment. I was able to resolve this issue by creating a new iOS enrollment profile and switching my default and devices over to the new profile. I reset a device that was having the problem, it enrolled and when I signed into the Company portal it only checked the device settings as show in this article:

https://www.petervanderwoude.nl/post/using-setup-assistant-with-modern-authentication/

It seems like my old enrollment profile was not installing the Company Portal app via the enrollment profile, so it did not have the correct configuration profile.

 

Hope this helps others!

Senior Member

@BMello 

I'll take a look at that article.  Is your enrollment profile set to use deploy CP via  VPP?  

  • Install Company Portal with VPP: Select Use Token: {YourToken} 

When I modified my profile I left it to deploy with VPP but the CP never installed via the enrollment profile.  Instead it installed via pushing the app to the device group from intune which is also device licensed.  We had to do this because the CP stopped updating at one time and was told by MS that this needed to be done.
So I just need to know if the supported config is setting the CP to deploy with VPP in the enrollment profile, and does it actually install?

 

Also it seems like the answer is always to create a new profile.  Modifying an existing profile never seems to work which is an issue.  So we have thousands of devices in multiple profiles.  Moving them around, setting a new default, is not the way to do business.

Visitor

Hi Jason,

 

I had my first profile set to deploy CP via VPP, but it was not working. I realized this after removing my required app deployment of CP via Apps. When I created the the new Enrollment profile with CP deployed via VPP, it started auto installing. I then added the app deployment back on, because like you said, this is needed to get app updates for CP. I rest and tried again and everything is still working. So it seems like something with the CP deployment via VPP in my original enrollment profile was corrupt. 

Senior Member

@BMello Thanks.  I created a new test enrollment profile and moved the test device to it.  It seemed to work correctly this time and the CP did install and well as I didn't get any duplicate management profiles trying to install. 

I'm not sure if this enrollment method benefits us over 'Authenticate with the Company Portal' or not.

Visitor

Jason, I believe Microsoft is planning to deprecate the Authenticate with Company Portal method in December of this year:

Move to Setup Assistant with Modern Authentication for Automated Device Enrollment
MC284343

Last spring, we announced public preview of Setup Assistant with Modern Authentication for iOS/iPadOS 13+ and macOS 10.15+ for Automated Device Enrollment (ADE), and in August, we made this enrollment flow generally available. This authentication method for ADE allows your organization to require authentication with Azure Active Directory (Azure AD) in an out-of-box experience (OOBE) during enrollment with Setup Assistant, prior to users accessing the home screen. You have the option to also require multi-factor authentication (MFA) depending on the settings in your Conditional Access policy. On or shortly after December 10, 2021, we will be ending support for the older enrollment method that allows you to force run Company Portal in Single App Mode until authentication.

How this will affect your organization:

You likely have already moved to use Setup Assistant with modern authentication, however, if you have not, you’ll want to move to this new authentication prior to the December date. This does not affect existing enrolled devices. Within the Microsoft Endpoint Manager admin center, you’ll want to either create a new ADE enrollment profile, or edit your existing enrollment profile to use the “Setup assistant with modern authentication.” The setting Run Company Portal in Single App Mode until authentication (Devices > iOS/iPadOS > Enrollment Program Tokens > select/create Profile > Management Settings) will no longer be available after this change.

 

User experience: This new enrollment flow does change the enrollment screen order to put authentication prior to accessing the home screen. If you have user guides that share screen shots, you’ll want to update those so the guides match the new experience.

What you need to do to prepare:

Review the updated documentation and several best practices blogs prior to moving. If you do not adopt the new enrollment profile prior to December 10, new devices will be unable to enroll until you do one of the following:

  1. (Recommended) Select Setup assistant with modern authentication.
  2. Use ADE user affinity enrollment with the Company Portal without configuring the Run Company Portal in Single App Mode until authentication setting.

Note: While you can still use ADE user affinity enrollment with the Company Portal for the authentication method, we do not recommend this since the user will need to manually run the Company Portal and complete the enrollment and Azure AD registration steps.

For More Information

Additional Information
Senior Member

@BMello Yes I received that today, but if you look closer at #2 it states the following:
2. Use ADE user affinity enrollment with the Company Portal without configuring the Run Company Portal in Single App Mode until authentication setting.

Currently we ARE using run company portal in single app mode until authentication.  Removing that option would get us past the 12/10/21 cut off.

This is one of the reasons I started to look at this.  So I don't know if I just want to remove the requirement to run in single app mode, or switch over entirely to SAwMA.  Thoughts?

Why the need to remove the enrollment option "Run Company Portal in Single App Mode until authentication"? Why not leaving in as an option?

 

We use it today and have done so for years, and it works. And it works for DEM-accounts.

 

The modern authentication option is really screwing thing up for us because the modern authentication does not support DEM-accounts, as stated by several people in this thread. You get a "There isn't a device setup for this account yet" error.

Many devices are not personal, hence we use DEM-accounts, but we still want to take advantage of the functionality that ADE brings. 

 

The only other option is to use authentication with CP but then no settings are puched to the device until you do that and nothing forces you to do it and you have to complete that step within 24 hours or the enrollment can fail.

The best thing with Run Company Portal in Single App Mode until authentication is that the user is forced to complete the enrollment before thay can use the device. The new modern authentication method also takes care of that on personal devices since the device is fully enrolled during setup assistant and settings is pushed to the user/device directly after the setup assistant. But completion of the enrollment process in CP does not work for DEM accounts and we enroll thousands of devices with those accounts...

 

 

Senior Member

Martin - I agree that using Authentication using Company Portal along with "company portal in single app mode until authentication" is the best option for our use case.  We hand out lots of devices for our field workers and want to the process to be as seamless as possible.  We also have scripts that will move devices around to different device restrictions.  Forcing the ownership on the user to complete additional steps isn't something we want to do.  I have a feeling this is going to generate more help desk calls.

Occasional Visitor

Like others have said, the ADE w/ Modern Auth needs Single-App Mode support of some kind. We dropship iPads to users and have them go through the enrollment process in single-app mode, it works fine. Giving the iPads to users that use ADE w/ Modern Auth requires additional steps of having them wait for CP to download and then run enrollment manually. Until they do so, the iPad is essentially open for use and not registered in MEM/Intune.

 

Going to hold off implementing this until it's addressed in some fashion.

Senior Member

@Intune Support Team Why is "Run Company Portal in Single App Mode until authentication" being dropped?  People are using this in their organizations.

Occasional Visitor

@Jason Salgado  I think the second paragraph here has the answer to your question:
https://techcommunity.microsoft.com/t5/intune-customer-success/move-to-setup-assistant-with-modern-a...

 

"However, what we discovered working with Apple on this incident is that Apple removed the functionality in 14.6 that we used for the Company Portal authentication method - Running the Company Portal in Single App Mode until authentication for ADE enrollment path. This break in flow for Single App Mode is described in the incident post and has led to an expedited move."

 

Seems like an Apple thing..

Senior Member

@Chris_P2045 Thanks.  I didn't read that article entirely and assumed it was going to be a permanent fix.  From the sound of it, Apple decided to put the feature back until the end of the year and then they will remove it again.

%3CLINGO-SUB%20id%3D%22lingo-sub-2280473%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2280473%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20trying%20this%20out%20on%20an%20iPad%2C%20the%20modern%20auth%20is%20working%20in%20the%20setup%20assistant%20and%20the%20device%20gets%20a%20management%20profile%20applied%20in%20this%20process%2F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHowever%2C%20from%20the%20launcher%20using%20'comp%20portal'%20shows%20the%20device%20as%20not%20enrolled%20and%20tries%20to%20download%20a%20new%20management%20profile%20from%20the%20workflow%2C%20the%20profile%20downloads%20and%20fails%20to%20install%20and%20the%20device%20doesn't%20end%20up%20compliant%20as%20a%20result.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENot%20sure%20if%20it%20is%20intentional%20to%20have%20the%20device%20try%20to%20get%20a%20new%20management%20profile%20after%20it%20already%20has%20one%20applied%20from%20the%20setup%20assistant.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2280540%22%20slang%3D%22fr-FR%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%20and%20macOS%2010.15)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2280540%22%20slang%3D%22fr-FR%22%3E%3CP%3EHi%20all%2C%20%3CBR%20%2F%3E%20I%20also%20experienced%20the%20same%20issue%20and%20this%20experience%20is%20similar%20like%20when%20you%20set-up%20an%20enrollment%20profile%20without%20user%20affinity%20then%20try%20to%20enroll%20the%20device%20linked%20to%20this%20profile.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EI'll%20describe%20here%20the%20user%20experience%20to%20help%20everyone%20understand%20well.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EUser%20experience%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3ELanguage%20%26gt%3B%20Country%2FRegion%20%26gt%3B%20Network%20%26gt%3B%20Device%20activation%20-%20Getting%20settings%20%26gt%3B%20Remote%20Management%20%26gt%3B%20Gettings%20settings%20from%20%22Company%20Name%22%20%26gt%3B%20Passcode%20%26gt%3B%20...%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CU%3ENote%3A%3C%2FU%3E%3C%2FSTRONG%3E%20Gettings%20settings%20from%20%22Company%20Name%22%20means%20that%20the%20device%20get%20ADE%20settings%20from%20Intune%20so%20the%20first%20Management%20profile%20is%20dowloaded%20and%20applied%20here.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAfter%20the%20company%20portal%20is%20installed%20and%20the%20user%20start%20the%20device%20enrollment%2C%20another%20Management%20profile%20is%20also%20downloaded%20and%20this%20one%20cannot%20be%20installed%20due%20to%20conflict.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20hope%20all%20those%20scenarios%20will%20find%20solutions.%3C%2FP%3E%3CP%3Ecc%3A%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226779%22%20target%3D%22_blank%22%3E%40Intune%20Support%20Team%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELooks%3C%2FP%3E%3CP%3EAEL%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2280630%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2280630%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1032892%22%20target%3D%22_blank%22%3E%40kpax-io%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F65545%22%20target%3D%22_blank%22%3E%40Aldo%20ELIAS%3C%2FA%3E%2C%26nbsp%3Bthank%20you%20for%20your%20feedback!%20It's%20helpful%20for%20us%20while%20this%20feature%20is%20in%20public%20preview%20and%20we%20work%20through%20issues%20that%20are%20found.%20We%20will%20take%20this%20issue%20back%20to%20the%20team%20to%20investigate.%20At%20the%20point%20of%20signing%20into%20the%20Company%20Portal%2C%20the%20device%20is%20already%20enrolled%20and%20there%20should%20not%20be%20an%20additional%20management%20profile%20coming%20down.%20While%20we%20don't%20have%20a%20specific%20fix%20right%20now%2C%20please%20make%20sure%20you%20are%20not%20sending%20down%20any%20app%20config%20policies%20targeted%20at%20the%20iOS%2FiPadOS%20Company%20Portal%20app%20if%20enrolling%20your%20device%20with%20setup%20assistant%20with%20modern%20authentication%20for%20iOS%2FiPadOS.%20For%20iOS%2FiPadOS%2C%20the%20correct%20app%20config%20is%20already%20being%20applied%20automatically%20behind%20the%20scenes%20in%20the%20enrollment%20profile%2C%20so%20no%20app%20config%20is%20needed%20for%20the%20iOS%2FiPadOS%20Company%20Portal.%20Sending%20down%20an%20additional%20app%20config%20in%20this%20case%20may%20result%20in%20an%20error.%20We%E2%80%99ll%20keep%20this%20post%20updated%20as%20we%20learn%20more.%20Thanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2279061%22%20slang%3D%22en-US%22%3ESetup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2279061%22%20slang%3D%22en-US%22%3E%3CP%3EWe%E2%80%99re%20excited%20to%20announce%20support%20for%20a%20new%20authentication%20method%20for%20Automated%20Device%20Enrollment%20(ADE)%20which%20is%20Setup%20Assistant%20with%20Modern%20Authentication.%20This%20new%20authentication%20method%20will%20be%20available%20for%20iOS%2FiPadOS%20devices%20running%2013.0%20and%20later%20and%20for%20macOS%20devices%20running%2010.15%20and%20later%2C%20in%20public%20preview%20in%20Microsoft%20Endpoint%20Manager.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-2005192789%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%20id%3D%22toc-hId-2005192763%22%3EOverview%3C%2FH3%3E%0A%3CP%3EThis%20new%20authentication%20method%20for%20automated%20device%20enrollment%20will%20allow%20your%20organization%20to%20require%20authentication%20with%20Azure%20AD%20(required)%20and%20multi-factor%20authentication%20(optional)%20in%20order%20to%20successfully%20enroll%20the%20device.%20The%20end%20user%20will%20be%20required%20to%20authenticate%20with%20their%20Azure%20AD%20credentials%20during%20Setup%20Assistant%2C%20with%20an%20additional%20Azure%20AD%20login%20to%20the%20Company%20Portal%20after%20enrollment.%20If%20the%20admin%20has%20a%20Conditional%20Access%20policy%20that%20requires%20multi-factor%20authentication%20(at%20enrollment%20only%2C%20or%20enrollment%20and%20Company%20Portal%20login)%20then%20MFA%20will%20be%20required%2C%20otherwise%20it%20is%20optional.%20This%20will%20benefit%20organizations%20that%20are%20looking%20to%20require%20authentication%20in%20the%20out-of-box%20experience%20(OOBE)%20during%20enrollment%20in%20the%20Setup%20Assistant%20screens%20prior%20to%20users%20accessing%20the%20home%20screen.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEnrollment%20is%20completed%20once%20the%20user%20lands%20on%20the%20home%20screen%2C%20and%20users%20can%20freely%20use%20the%20device%20for%20resources%20not%20protected%20by%20Conditional%20Access.%20User%20affinity%20is%20established%20when%20users%20land%20on%20the%20home%20screen%20after%20the%20setup%20screens%2C%20however%20the%20device%20will%20not%20be%20fully%20registered%20with%20Azure%20AD%20until%20the%20Company%20Portal%20login.%20The%20device%20will%20not%20show%20up%20in%20a%20given%20user's%20device%20list%20in%20the%20Azure%20AD%20portal%20until%20the%20Company%20Portal%20login.%20That%20additional%20Azure%20AD%20login%20to%20the%20Company%20Portal%20app%20fully%20completes%20Azure%20AD%20registration.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20creating%20an%20Automated%20Device%20Enrollment%20profile%2C%20you'll%20be%20able%20to%20choose%20a%20new%20authentication%20method%3A%20%3CSTRONG%3ESetup%20Assistant%20with%20modern%20authentication%20(preview)%3C%2FSTRONG%3E.%20This%20method%20provides%20all%20the%20security%20from%20authenticating%20with%20the%20Company%20Portal%20but%20avoids%20the%20issue%20of%20leaving%20end%20users%20stuck%20on%20a%20device%20they%20can't%20use%20while%20the%20Company%20Portal%20installs%20on%20the%20device.%20With%20this%20new%20authentication%20method%2C%20the%20user%20has%20to%20authenticate%20using%20Azure%20AD%20credentials%20during%20the%20setup%20assistant%20screens.%20This%20will%20require%20an%20additional%20Azure%20AD%20login%20post-enrollment%20in%20in%20the%20Company%20Portal%20app%20to%20gain%20access%20to%20corporate%20resources%20protected%20by%20Conditional%20Access.%20The%20correct%20Company%20Portal%20version%20will%20automatically%20be%20sent%20down%20as%20a%20required%20app%20to%20the%20device%20for%20iOS%2FiPadOS%2C%20which%20we%20recommend%20choosing%20a%20VPP%20token%20for%20the%20enrollment%20profile.%20Otherwise%2C%20it%20will%20be%20sent%20down%20if%20the%20end%20user%20completes%20setting%20up%20their%20Apple%20ID%20during%20the%20Setup%20Assistant%20screens.%20For%20macOS%2C%20here%20are%20the%20options%20to%20get%20the%20Company%20Portal%20on%20the%20device%20-%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fapps%2Fapps-company-portal-macos%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAdd%20the%20Company%20Portal%20for%20macOS%20app%20-%20Microsoft%20Intune%20%7C%20Microsoft%20Docs%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20admin%20configures%20a%20Conditional%20Access%20policy%20to%20require%20multi-factor%20authentication%20(MFA)%2C%20then%20the%20end%20user%20will%20need%20a%20second%20device%20to%20complete%20MFA.%20Multi-factor%20authentication%20is%20optional%20based%20on%20the%20configuration%20of%20the%20MFA%20Azure%20AD%20settings.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-197738326%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%20id%3D%22toc-hId-197738300%22%3ECompany%20Portal%20Redirection%3C%2FH3%3E%0A%3CP%3EA%20new%20improvement%20we%E2%80%99ve%20made%20to%20our%20onboarding%20experience%20helps%20guide%20end%20users%20to%20complete%20that%20second%20Azure%20AD%20authentication%20by%20automatically%20redirecting%20to%20the%20iOS%2FiPadOS%20Company%20Portal%20when%20the%20user%20attempts%20to%20access%20corporate%20data.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIf%20users%20open%20any%20managed%20iOS%2FiPadOS%20applications%20that%20are%20protected%20by%20Conditional%20Access%20and%20they%20haven't%20completed%20the%20additional%20Azure%20AD%20login%20into%20the%20iOS%2FiPadOS%20Company%20Portal%2C%20they%20will%20be%20redirected%20to%20the%20iOS%2FiPadOS%20Company%20Portal%20from%20those%20other%20apps%20as%20part%20of%20this%20new%20change.%20This%20way%2C%20users%20will%20know%20exactly%20where%20to%20go%20to%20get%20access%20to%20resources%20protected%20by%20Conditional%20Access%20and%20will%20be%20guided%20to%20complete%20that%20last%20step.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EHere%20is%20what%20it%20will%20look%20like%20if%20the%20end%20user%20tries%20to%20open%20any%20app%20protected%20by%20Conditional%20Access%20before%20authenticating%20in%20the%20Company%20Portal%20%E2%80%93%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ModernAuthBlog-1.png%22%20style%3D%22width%3A%20420px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F274044iFE263521860D7B15%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ModernAuthBlog-1.png%22%20alt%3D%22Conditional%20Access%20block%20screen%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EConditional%20Access%20block%20screen%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ModernAuthBlog-2.png%22%20style%3D%22width%3A%20594px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F274045iEF33318710A911F8%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ModernAuthBlog-2.png%22%20alt%3D%22System%20prompt%20that%20opens%20the%20iOS%2FiPadOS%20Company%20Portal%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ESystem%20prompt%20that%20opens%20the%20iOS%2FiPadOS%20Company%20Portal%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1609716137%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%20id%3D%22toc-hId--1609716163%22%3EConfiguration%20in%20Microsoft%20Endpoint%20Manager%20admin%20center%3C%2FH3%3E%0A%3CP%3ELearn%20how%20to%20configure%20the%20new%20Setup%20Assistant%20with%20Modern%20Authentication%20for%20iOS%2FiPadOS%20and%20macOS%20in%20the%20Microsoft%20Endpoint%20Manager%20admin%20center%20by%20reading%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fenrollment%2Fdevice-enrollment-program-enroll-ios%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnroll%20iOS%2FiPadOS%20devices%20by%20using%20ADE%20-%20Microsoft%20Intune%20%7C%20Microsoft%20Docs%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fenrollment%2Fdevice-enrollment-program-enroll-macos%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnroll%20macOS%20devices%20-%20Apple%20Business%20Manager%20or%20Apple%20School%20Manager%20%7C%20Microsoft%20Docs%3C%2FA%3E.%20Within%20the%20MEM%20admin%20center%2C%20you%20can%20control%20where%20a%20user%20is%20prompted%20for%20multi-factor%20authentication%20using%20different%20cloud%20apps%20when%20creating%20a%20Conditional%20Access%20policy.%20The%20following%20screenshot%20provides%20an%20example%20of%20the%20prompt%20locations%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ModernAuthBlog-3.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F274046i1A396ADC6943E4FA%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ModernAuthBlog-3.png%22%20alt%3D%22MFA%20Prompt%20Locations%20for%20Microsoft%20Intune%20and%20Microsoft%20Intune%20Enrolment%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMFA%20Prompt%20Locations%20for%20Microsoft%20Intune%20and%20Microsoft%20Intune%20Enrolment%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-877796696%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%20id%3D%22toc-hId-877796670%22%3EUsing%20the%20enrolled%20device%20with%20user%20device%20affinity%20but%20without%20Azure%20AD%20registration%3C%2FH3%3E%0A%3CP%3EFor%20both%20iOS%2FiPadOS%20and%20macOS%2C%20user%20device%20affinity%20in%20Intune%20is%20established%20when%20users%20land%20on%20the%20home%20screen%20after%20the%20setup%20screens.%20However%2C%20the%20device%20will%20not%20be%20fully%20registered%20with%20Azure%20AD%20until%20the%20additional%20Company%20Portal%20login%20as%20mentioned%20above.%20That%20is%20also%20when%20device%20compliance%20is%20assessed%2C%20and%20the%20device%20shows%20up%20as%20compliant%20in%20the%20Microsoft%20Endpoint%20Manager%20admin%20center.%20If%20you%20would%20like%20to%20keep%20the%20device%20as%20fully%20enrolled%20with%20Intune%20but%20without%20Azure%20AD%20registration%2C%20that%20is%20also%20supported.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20enrollment%20is%20completed%20during%20Setup%20Assistant%2C%20the%20end%20user%20lands%20on%20the%20home%20screen%20and%20can%20freely%20use%20the%20device.%20If%20there%20are%20no%20resources%20protected%20by%20Conditional%20Access%20and%20if%20Azure%20AD%20registration%20is%20not%20required%2C%20then%20this%20authentication%20method%20can%20be%20used%20to%20fully%20enroll%20the%20device.%20Note%20the%20following%20device%20behavior%20if%20you%20choose%20this%20automated%20device%20enrollment%20flow%20without%20guiding%20end%20users%20to%20login%20to%20the%20Company%20Portal%20post%20enrollment%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20device%20will%20not%20show%20up%20in%20a%20given%20user%E2%80%99s%20device%20list%20in%20the%20Azure%20AD%20portal%20(since%20there%20is%20no%20device%20identity%20association%20within%20Azure%20AD).%3C%2FLI%3E%0A%3CLI%3EThe%20device%20will%20not%20show%20up%20as%20compliant%20in%20the%20Microsoft%20Endpoint%20Manager%20admin%20center.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--929657767%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%20id%3D%22toc-hId--929657793%22%3EKeep%20in%20my%20mind%3C%2FH3%3E%0A%3CUL%3E%0A%3CLI%3EIf%20you%20choose%20%22Setup%20assistant%20with%20Modern%20Authentication%22%20as%20the%20authentication%20method%20when%20creating%20a%20profile%20for%20a%20device%20not%20running%20the%20correct%20software%20version%2C%20users%20will%20fall%20back%20to%20the%20legacy%20setup%20assistant%20Automated%20Device%20Enrollment%20flow.%3C%2FLI%3E%0A%3CLI%3EFor%20iOS%2FiPadOS%2C%20we%20recommend%20selecting%20to%20install%20the%20Company%20Portal%20app%20from%20a%20VPP%20token%20in%20the%20enrollment%20profile.%20When%20VPP%20is%20used%2C%20the%20application%20can%20be%20downloaded%20and%20installed%20without%20user%20interaction.%20When%20VPP%20isn't%20used%2C%20an%20Apple%20ID%20is%20required%20to%20install%20the%20application.%20If%20the%20user%20doesn't%20log%20into%20an%20Apple%20ID%20during%20Setup%20Assistant%20they%20will%20be%20prompted%20to%20log%20in%20when%20Intune%20attempts%20to%20install%20the%20Company%20Portal.%3CUL%20class%3D%22lia-list-style-type-circle%22%3E%0A%3CLI%3EFor%20more%20information%20about%20connecting%20Intune%20to%20Apple%20Volume%20Purchase%20Program%20(VPP)%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fapps%2Fvpp-apps-ios%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EManage%20Apple%20volume-purchased%20apps%20-%20Microsoft%20Intune%20%7C%20Microsoft%20Docs%3C%2FA%3E.%20Once%20you%20have%20connected%20to%20VPP%20you%20can%20add%20the%20Company%20Portal%20app%20to%20your%20Apple%20Business%20Manager%2FApple%20School%20Manager%20inventory%20so%20it%20can%20be%20assigned%20through%20Intune.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet%20us%20know%20if%20you%20have%20any%20questions%20by%20commenting%20on%20this%20post%20or%20reaching%20out%20to%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FIntuneSuppTeam%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%40IntuneSuppTeam%3C%2FA%3E%20on%20Twitter.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2279061%22%20slang%3D%22en-US%22%3E%3CP%3EWe%E2%80%99re%20excited%20to%20announce%20support%20for%20a%20new%20authentication%20method%20for%20Automated%20Device%20Enrollment%20(ADE)%20which%20is%20Setup%20Assistant%20with%20Modern%20Authentication%20in%20public%20preview%20in%20Microsoft%20Endpoint%20Manager!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22BlogDefault.png%22%20style%3D%22width%3A%20295px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F274048iF3A9E48F2AD52105%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22BlogDefault.png%22%20alt%3D%22BlogDefault.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2279061%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EmacOS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Emodern%20authentication%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPublic%20Preview%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESetup%20Assistant%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2329951%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2329951%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226779%22%20target%3D%22_blank%22%3E%40Intune%20Support%20Team%3C%2FA%3E%26nbsp%3B%20Thankyou%20for%20sharing%20the%20feature%20update.%20Definitely%20this%20is%20exciting%20and%20adds%20a%20lot%20of%20benefits.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWould%20like%20to%20share%20the%20observations%20that%2C%20once%20the%20device%20lands%20home%20screen%20and%20Company%20portal%20is%20installed%20the%20device%20checks%20in%20automatically%20and%20device%20records%20is%20created%20on%20MEM%20console%20and%20the%20device%20is%20marked%20complaint%20without%20having%20to%20manually%20login%20to%20Company%20portal%20.%3C%2FP%3E%3CP%3ENote-%20the%20articles%20described%20that%20CP%20login%20is%20required%20once%20the%20device%20lands%20home%20screen%20to%20access%20CA%20protected%20apps.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2330896%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2330896%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20(date)%20Setup%20Assistant%20with%20Modern%20Auth%20will%20be%20Generally%20available%3F%3CBR%20%2F%3Ewhat%20is%20the%20risk%20in%20testing%20this%20feature%20in%20Production%20devices..%20anything%20specific%20we%20need%20to%20be%20careful%20of%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2333229%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2333229%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F999002%22%20target%3D%22_blank%22%3E%40gokulansubramani%3C%2FA%3E%2C%3C%2FP%3E%3CP%3EOnly%20your%20context%20of%20your%20company%20can%20help%20you%20for%20this%20kind%20of%20decision.%3C%2FP%3E%3CP%3EI%20recommend%20to%20test%20using%20spare%20devices%20and%20if%20you%20feel%20confident%20to%20try%20with%20production%20devices%20you%20accept%20the%20risk%20of%20enhancement%20or%20changes%20after%20the%20product%20team%20change%20something.%20You%20also%20have%20to%20consider%20your%20rollback%20capabilities%20and%20your%20business%20impact%20for%20each%20scenarios.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226779%22%20target%3D%22_blank%22%3E%40Intune%20Support%20Team%3C%2FA%3E%26nbsp%3B%20can%20also%20advise%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBR%2C%3C%2FP%3E%3CP%3EAEL%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2362791%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2362791%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F999002%22%20target%3D%22_blank%22%3E%40gokulansubramani%3C%2FA%3E%2C%20thanks%20for%20the%20comment!%26nbsp%3BThough%20we%20don't%20have%20any%20ETAs%20to%20currently%20share%2C%20stay%20tuned%20to%20this%20post%20for%20any%20future%20updates%20as%20well%20as%20our%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMEMID%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIn%20development%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMEMWN%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWhat's%20new%3C%2FA%3E%20docs%20for%20new%20announcements%20regarding%20this%20feature.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAdding%20on%20to%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F65545%22%20target%3D%22_blank%22%3E%40Aldo%20ELIAS%3C%2FA%3E's%20comment%2C%20you%20may%20want%20to%20start%20with%20a%20pilot%20or%20test%20group%20before%20rolling%20this%20feature%20to%20your%20environment.%26nbsp%3BAfter%20a%20successful%20pilot%2C%20you're%20ready%20to%20start%20a%20full%20production%20rollout.%20For%20more%20info%20on%20user%2Fdevice%20targeting%2C%20see%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Ffundamentals%2Fgroups-add%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eadd%20groups%20to%20organize%20users%20and%20devices%3C%2FA%3E%26nbsp%3Bto%20learn%20more.%20Hope%20this%20helps!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2381759%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2381759%22%20slang%3D%22en-US%22%3E%3CP%3EI%20started%20using%20the%20%22%3CSPAN%3ESetup%20Assistant%20with%20modern%20authentication%20(preview)%22%20and%20it%20seems%20to%20work%20well%20and%20the%20process%20works%20as%20expected.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EI%20did%20run%20into%20an%20issue%20when%20trying%20to%20enroll%20a%20device%20using%20a%20DEM%20account%20following%20the%20same%20process%2C%20enrollment%20profile.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EOnce%20the%20Company%20Portal%20setup%20starts%2C%20I%20get%20a%20%22There%20isn't%20a%20device%20setup%20for%20this%20account%20yet%22%20error%20and%20it%20does%20not%20allow%20me%20to%20proceed%2C%20thus%20device%20does%20not%20register.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAnyone%20else%20having%20the%20same%20issue%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2395336%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2395336%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20will%20MS%20support%20MFA%20durin%20ADE%3F%3CBR%20%2F%3ERight%20now%20if%20we%20have%20MFA%20requirments%20during%20Intune%20enrollment%20with%20Setup%20assistant%20with%20Modern%20auth%2C%20user%20are%20stuck%20to%20move%20on%20IF%20they%20dont%20have%20a%20second%20device%20to%20configure%20MFA%20on%3F%3CBR%20%2F%3E%3CBR%20%2F%3EIs%20there%20any%20plan%20on%20creating%20cloud%20app%20%22Company%20portal%22%20where%20you%20can%20choose%20to%20set%20MFA%20requirement%20during%20Company%20portal%20sign%20in%20instead%20during%20setup%20assistant%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThat%20will%20help%20us%20move%20forward%20with%20our%20ADE%20solution%20that%20requires%20MFA.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2280560%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2280560%22%20slang%3D%22en-US%22%3E%3CP%3EI%20have%20made%20some%20progress.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUnder%20DEP%20Profile%2C%20tenant%20admin%20%26gt%3B%20customization%2C%20I%20changed%20this%20setting%20'Device%20enrollment'%20to%20'Available%2C%20no%20prompts'%20from%20'Available%2C%20with%20Prompts'.%26nbsp%3BAdditionally%2C%20I%20removed%20my%20own%20account%20as%20an%20enrollment%20manager.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWith%20these%20two%20steps%20removed%20the%20additional%20profile%20download%20is%20no%20longer%20occurring.%20In%20%22Comp%20Portal%22%20under%20'Devices'%20it%20displays%20says%20%22Register%20this%20device%22%20for%20my%20iPad%2C%20but%20otherwise%20compliant%20with%20policies%20and%20the%20iPad%20is%20shown%20in%20the%20endpoint%20manager%20and%20I%20am%20able%20to%20use%20functions%20from%20there%20on%20the%20device.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELet%20us%20know%20if%20any%20of%20this%20is%20expected%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%2C%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2464153%22%20slang%3D%22en-US%22%3ERe%3A%20Setup%20Assistant%20with%20Modern%20Auth%20for%20ADE%20(iOS%2FiPadOS%2013%2B%20and%20macOS%2010.15%2B)%20-%20Intune%20Public%20Previ%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2464153%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F206637%22%20target%3D%22_blank%22%3E%40Joel%20Gonzalez%3C%2FA%3E%2C%20thanks%20for%20the%20feedback!%3C%2FP%3E%0A%3CP%3EThere%20are%20a%20few%20limitations%20of%20devices%20that%20are%20enrolled%20with%20a%20DEM%20account%20and%20would%20like%20to%20share%20that%20DEM%20accounts%20cannot%20be%20used%20when%20enrolling%20devices%20via%20Apple's%20Automated%20Device%20Enrollment%20(ADE).%20See%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fenrollment%2Fdevice-enrollment-manager-enroll%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnroll%20devices%20using%20a%20device%20enrollment%20manager%20account%3C%2FA%3E%20to%20learn%20more%20about%20current%20limitations.%3C%2FP%3E%0A%3CP%3EIf%20you%20continue%20to%20experience%20the%20same%20%22There%20isn't%20a%20device%20setup%20for%20this%20account%20yet%22%20error%20not%20working%20as%20expected%2C%20let%E2%80%99s%20get%20you%20over%20to%20our%20support%20folks%20for%20further%20investigation.%20Please%20open%20a%20support%20request%20from%20within%20the%20Help%20%2B%20support%20blade%2C%20or%20any%20of%20the%20methods%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FIntuneSupport%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20Once%20created%2C%20feel%20free%20message%20us%20with%20your%20support%20case%20number%20so%20that%20we%20can%20have%20an%20eye%20on%20the%20case.%20Thanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Sep 02 2021 08:34 AM
Updated by: