SOLVED

Conditional Access - Intune for Windows and Airwatch for iOS

Brass Contributor

Hi all,

 

My customer uses Intune for managing Windows devices and Airwatch for their iOS phones. He wants to allow access to O365 only from a corporate device.

Is there a way to make Intune aware that Airwatch devices are corporate devices?

7 Replies

Hi,

 

No. You cant manage 1 device with 2 MDM solution. You can start using conditional access policy or MAM policy without Enrollment.

Hi and thank you for your reply,

 

I know you can't enroll a device to 2 different MDM solutions, and that is not what I am trying to do.

I don't want to enroll my iOS devices to Intune, I just want Intune to know that those devices are the only one authorized to access O365.

MAM policy is not an option as all personnal devices will be able to access O365.

Hi,

you can't use Airwatch enrolled mobile devices (iOS/Android) with Conditional Access except for Windows 10 as device type. You can raise your request here on UserVoice. There are people already asking for this:  https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/33713527-support-for-3rd...

 

best,

Oliver

best response confirmed by Mathieu Aït Azzouzène (Brass Contributor)
Solution

BTW, here is the official link to that:

https://docs.microsoft.com/en-au/azure/active-directory/conditional-access/controls

 

You can configure conditional access policies that are device-based. The objective of a device-based conditional access policy is to only grant access to the selected cloud apps from managed devices. Requiring a device to be marked as compliant is one option you have to limit access to managed devices. A device can be marked as compliant by Intune (for any device OS) or by your third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.

@Oliver Kieselbach Any updates to this thread? We have a similar scenario involving 20K AW-managed devices... End goal is to have Azure AD Conditional Access Policies recognize them as "managed"

@Benjamin Carpena 

 

No, you can do windows 10 and IOS with Intunes or you can manage W10 with intunes and IOS with Airwatch.

 

http://www.air-watch.com/downloads/resources/AirWatch_Support_for_Office_365_20150724_v421.pdf

 

 

Hey @Jeffrey_Goins,

 

yes that changed lately. At the start time of the thread it was not available. Now there is a private preview and they are in progress to launch this feature as public preview, see here:

 

Set device compliance state from third-party MDM partners

Microsoft 365 customers who own third-party MDM solutions will be able to enforce Conditional Access policies for Microsoft 365 apps on iOS and Android via integration with Microsoft Intune Device Compliance service. Third-party MDM vendor will leverage the Intune Device Compliance service to send device compliance data to Intune. Intune will then evaluate to determine if the device is trusted and set the conditional access attributes in Azure AD. Customers will be required to set Azure AD Conditional Access policies from within the Microsoft Endpoint Manager admin center or the Azure AD portal.

 

https://docs.microsoft.com/en-us/mem/intune/fundamentals/in-development

 

best,

Oliver

1 best response

Accepted Solutions
best response confirmed by Mathieu Aït Azzouzène (Brass Contributor)
Solution

BTW, here is the official link to that:

https://docs.microsoft.com/en-au/azure/active-directory/conditional-access/controls

 

You can configure conditional access policies that are device-based. The objective of a device-based conditional access policy is to only grant access to the selected cloud apps from managed devices. Requiring a device to be marked as compliant is one option you have to limit access to managed devices. A device can be marked as compliant by Intune (for any device OS) or by your third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.

View solution in original post