Setting up multi-tenant Intune enrollment for MSAL users
If you offer an app to many organizations (that is, organizations that use different Azure AD tenants), you can make your app "multi-tenant" by configuring your app to accept sign-ins from any Azure AD tenant. Users in any Azure AD tenant can then sign into your app after consenting to use their account with your app.
This article describes how to make your app multi-tenant using a Microsoft Intune step when using the Blue Cedar Platform to orchestrate mobile app deployment. If the app does not already have the Microsoft Authentication Library (MSAL) built into it, MSAL can be added via the Blue Cedar Platform. (See Automatically deploying Intune-enabled apps.)
Step-by-step guide
Configure the Intune step with the app's Azure AD registration as described in No-Code Integration - Microsoft Intune. (Add any other stages and steps desired.) If you already have MSAL in your app, make sure any hard-coded authority value is set to the common authority value.
For multi-tenant apps, when you configure the app registration on the Microsoft portal, there are a few differences from the single-tenant app registration described on the No-Code Integration - Microsoft Intune page. The single vs multi-tenant differences are designated here with a .
Register the mobile app as a multi-tenant app on the Microsoft portal
- Using an account with Application administrator privileges, log into the Azure Active Directory admin center:
https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps - Search for an existing app or, to create a new registration, follow these steps:
- Click + New registration.
- On the "Register an application" screen, enter a name.
- Under "Supported account types," select "Accounts in any organizational directory (Any Azure AD directory - Multitenant)."
- Click Register.
Configure API permissions for the multi-tenant mobile app
- On the screen for your app registration, copy these values from the Essentials section and save them to use on the Blue Cedar Platform for configuration:
- Application (client) ID
- Directory (tenant) ID
- On the same application screen, click API permissions, and add the following permissions:
- Microsoft Graph API:
- offline_access
- openid
- User.Read
- Microsoft Mobile Application Management
- DeviceManagementManagedApps.ReadWrite
- Intune API:
- get_data_warehouse
- Microsoft Graph API:
Use the Intune step in a workflow
Continue with the workflow instructions as described in No-Code Integration - Microsoft Intune.
Related articles
See https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant for more information about making apps multi-tenant.