Jun 25 2018 10:22 AM
Jun 26 2018 01:40 AMSolution
Jul 31 2018 06:48 AM
Thank You for your feedback and I will appreciate your patience .
Sure we will update the same thread when this feature is implemented .
Aug 24 2018 04:41 AM
Aug 24 2018 06:21 AM
Aug 24 2018 07:08 AM
FYI: I followed the potential workaround steps but they didn't work.
I still get the "you can't get there from here" message
Oct 01 2018 01:24 AM
This has been added to the list of "Approved Apps" on the web page here https://docs.microsoft.com/en-gb/azure/active-directory/conditional-access/technical-reference#appro...
but I get the following message when I try to login
"Application used is not an approved application for conditional access. User needs to use one of the apps from the list of approved applications to use in order to get access."
Does the client need to be updated?
Oct 01 2018 07:24 AM
This is great, finally!
It's working for me now on the Insider (beta) version of the Android To Do app
Oct 01 2018 07:33 AM
Interesting. Is there anything in your Intune/Conditional Access policies that references To-Do itself?
Oct 02 2018 06:06 AM
THis is only working for us on the Insider/beta To Do app at the moment
In our Conditional Access policy it is just set to "require approved client app" in the access controls
I also have To Do added as a Client app in the manage/Apps blade but it isn't assigned to anyone
In our Intune App Protection Policy Ihave added a custom app to the Targeted Apps
For Android policy: com.microsoft.todos
For iOS policy: com.microsoft.to-do
The policy settings currently allow them to use any app
Jan 21 2019 12:06 AM
Hi @fgocinski, yes I got this working. The problem for us was that were using old Conditional Access policies (Classic CA policies). These were hidden in our Azure portal. Once we were able to delete them, To_Do worked fine for us.
Jan 21 2019 06:56 AM
We were using the old CA polices as well, and this is what I suspected to be the issue because our CA rules were still working. Where did you end up finding these "Classic Polices"? Nothing is listed when I am under Azure, CA, then "classic polices"... Thank you!
Jan 21 2019 07:00 AM - edited Jan 21 2019 07:01 AM
Hi @fgocinski, I had to go through a special link that an Azure/Intune support engineer provided. It took me about six different support people to find one who understood what I was talking about though!
This is the link they provided
Hope it helps.
Jan 21 2019 07:05 AM
Well I only had three more engineers left to talk to then I guess! I was talking to #3 and not getting any help. I even told them I suspected old CA rules were the root cause and got nothing.
Thank you so much David!
This really needs to be on Microsoft's Intune documentation for early Intune adapters.
Jan 21 2019 07:07 AM
Yes, I was using the old CA rules that only allowed certain apps access Office 365 services.
What was really annoying was that Azure was telling me I still had Classic CA policies when I did a "What if" check but I couldn't find. I've no idea why they hid these policies.
Jan 21 2019 11:13 AM
Agreed, they hid the polices, yet had a page designed to show the classic polices. Why hide them? Makes NO sense and has taken hours of my life away trying to figure this out.