This guide applies to Mac computers
This article goes over configuring Passport to use Mac login. If you’re using MFA, or want to configure Web Login, please see Configure Passport with Microsoft Entra ID - Web Login.
About Passport with Microsoft Entra ID Mac Login
Passport with Microsoft Entra ID Mac Login enables users to log into Mac computers using their Microsoft Entra ID credentials through a standard username/password interface. This method is ideal for environments without multi-factor authentication requirements.How It Works
Passport integrates with your Microsoft Entra ID tenant to authenticate users at the macOS login screen using standard username and password fields. When users enter their Entra ID credentials, Passport verifies them against your tenant and creates or updates the local Mac user account.Prerequisites
- Access to a Microsoft Entra ID admin user account to grant the Passport app the proper permissions
Create the App Registration
Sign in to Microsoft Entra admin center
Sign in to the Microsoft Entra admin center using a Global Administrator account.
Configure application details
On the register an application dialog, enter a name for the new application (such as “Iru Passport Mac Login”).
For more information about redirect URI restrictions, platform types, and best practices, see Microsoft’s redirect URI documentation.
Configure Application Details
Prepare secure document
Open a secure text document where the values for this OIDC app can be temporarily stored. You will need these details when you configure the Passport Library Item.
Copy Application ID
On the Overview page, copy the Application (client) ID to a temporary secure text document.
Copy metadata document
Copy OpenID Connect metadata document(identity provider URL) to a temporary secure text document.
Select groups
Select All groups.
Entra ID SAML only supports up to 150 security groups. If you have more than 150 security groups, you should not use All groups, but rather select specific groups. You can read more in Microsoft’s Configure group claims for applications by using Microsoft Entra ID article.
Configure API Permissions
Expand OpenID permissions
Confirm that the OpenId permissions section is expanded. If the OpenID permissions section isn’t expanded, click the icon next to the OpenId permissions section to expand it.
Confirm User.Read selection
In the User section, confirm that User.Read is already selected. If User.Read isn’t selected, select it.
Grant admin consent
While still on the API permissions page, select Grant admin consent for <your_tenant_name>.
Assign Users and Groups
By default, when you create a new App registration, the “Assignment required?” attribute is set to “No”. However, if your Passport Enterprise app is set to require assignment, you will need to follow these steps to assign users in order to be able to use your Passport app.
Access Enterprise Applications
In the Identity navigation menu on the left, open Applications and select Enterprise Applications.
Select your Passport app
In the All applications list, select Iru Passport Mac Login or whatever name you named the App registration in the previous section.
Check assignment requirement
Inspect the Assignment required? setting. If it is set to “No,” then you can skip the rest of this section. All users in Entra ID will be able to use the Passport app.
Configure visibility
Confirm that the Visible to users? setting is set toggled to “No”; otherwise, users will see it in their portal. The Passport app is only useful as a replacement for the macOS login window.

Assign Users and Groups (If Required)
If the Assignment required? setting is set to “Yes,” proceed with the following steps.
Choose users and groups
A list of users and security groups is displayed. You can search for a specific user or group or select multiple users and groups that appear in the list.
If you see the message below, it means that a free tier is being used. You can only add users (not groups) to the Passport Enterprise App.
Microsoft Entra ID Conditional Access Considerations
When using the Mac Login Passport Configuration only: If Entra ID is configured with a Microsoft Entra ID Conditional Access policy that specifies MFA as a requirement and specifies all or specific cloud apps, you’ll need to exclude the Enterprise application that you use for Passport from that policy. Another way to describe such a policy is that the policy uses both of these criteria:- Assignments: Target resources: Cloud apps: All cloud apps or Select apps
- Access controls: Grant: Grant access: Require multifactor authentication


Add the Cloud App Exclusion
Exclude the Enterprise app you use for Iru Passport for each applicable policy.Access Protection settings
In the Microsoft Entra admin center, open the portal menu and then select Protection.
Review policies
Confirm that the portal displays each policy with a Policy Name and a State (among other information).
Check target resources
If the Target resources section displays No target resources selected, then return to the previous step and select the next policy.
Review excluded apps
Review the list of excluded cloud apps (there may be no excluded cloud apps). If the Enterprise app for Iru Passport is already excluded, you can return to step 3 and proceed to the next policy.
Search for Passport app
In the Search field, enter the name of the Enterprise app you use for Iru Passport. Note that the search doesn’t just search for any part of the name; you need to enter at least the start of the name.
Select Passport app
Select the checkbox for your Enterprise app for Iru Passport from the search results.
User Account Provisioning via Passport
If you use Specify per identity provider group option in the Passport Library Item, use the Entra ID group ObjectID in the Identity provider group field.
Access Groups
Sign in to the Microsoft Entra admin center. In the Identity navigation menu on the left, open Groups and select All groups.
Configure Passport Library Item
In the Iru Endpoint Passport Library Item, in the User Provisioning section, paste the value from the previous section into the Identity provider group field.
Repeat for additional groups
Repeat the previous steps for each additional Entra ID group you want to use.
- If you set the default account type to standard user, only add administrator account types in the Identity provider groups. Unless otherwise specified as administrators in your Identity provider groups, all users will be created as standard users by default.
- If you set the default account type to administrators, only add standard account types in the Identity provider groups. All users will be created as administrators by default unless otherwise specified as standard users in your Identity provider groups.




.png?fit=max&auto=format&n=2JN9EXN6FEm5sMxP&q=85&s=4bd38e97502d55069ffba70303e5f94b)










