Passport with Microsoft Entra ID Mac Login signs users in at the Mac login window with their Microsoft Entra ID username and password. For Web Login (Microsoft Entra ID sign-in in the Passport web view, including when you need MFA), use Configure Passport with Microsoft Entra ID - Web Login.
Passport integrates with your Microsoft Entra ID tenant to authenticate users at the macOS login screen using standard username and password fields. When users enter their Entra ID credentials, Passport verifies them against your tenant and creates or updates the local Mac user account.
Open a secure text document where the values for this OIDC app can be temporarily stored. You will need these details when you configure the Passport Library Item.
2
Copy Application ID
On the Overview page, copy the Application (client) ID to a temporary secure text document.
3
Access endpoints
While still on the Overview page, click Endpoints.
4
Copy metadata document
Copy the OpenID Connect metadata document (identity provider URL) to your temporary secure text document.
5
Access Authentication settings
On the left, select Authentication.
6
Enable mobile and desktop flows
Set Enable the following mobile and desktop flows to Yes.
7
Save authentication settings
Click Save.
8
Access Token configuration
On the left, select Token configuration.
9
Add optional claim
Click Add optional claim.
10
Configure token type
For the Token type, select ID.
11
Select claim
For the Claim, select preferred_username.
12
Add the claim
Click Add.
13
Add groups claim
While still on the Token configuration page, click Add groups claim.
14
Select groups
Select All groups.
Entra ID SAML only supports up to 150 security groups. If you have more than 150 security groups, you should not use All groups, but rather select specific groups. You can read more in Microsoft’s Configure group claims for applications by using Microsoft Entra ID article.
15
Add groups claim
Click Add.
Once you complete the token configurations, you will see both optional claims.
Confirm that the OpenID permissions section is expanded. If it is not expanded, click the expand icon next to OpenID permissions.
6
Select email permission
Select email.
7
Select profile permission
Select profile.
8
Search for User.Read permission
In the Select permissions field, enter User.Read.
9
Confirm User.Read selection
In the User section, confirm that User.Read is already selected. If User.Read isn’t selected, select it.
10
Add permissions
Click Add permissions.
11
Grant admin consent
While still on the API permissions page, select Grant admin consent for <your_tenant_name>.
12
Confirm admin consent
Select Yes.
You should see a notification similar to the one below, and you should see a “Granted for <your_tenant_name> …” message in the Status column next to each permission.
By default, when you create a new App registration, the “Assignment required?” attribute is set to “No”. However, if your Passport Enterprise app is set to require assignment, you will need to follow these steps to assign users in order to be able to use your Passport app.
1
Access Enterprise Applications
In the Identity navigation menu on the left, open Applications and select Enterprise Applications.
2
Select your Passport app
In the All applications list, select Iru Passport Mac Login or whatever name you named the App registration in the previous section.
3
Access Properties
Under Manage, select Properties.
4
Add logo (optional)
Optionally, add a logo to your Enterprise App.
5
Check assignment requirement
Inspect the Assignment required? setting. If it is set to “No,” then you can skip the rest of this section. All users in Entra ID will be able to use the Passport app.
6
Configure visibility
Confirm that Visible to users? is set to No; otherwise, users will see the app in their portal. The Passport app is only useful as a replacement for the macOS login window.
7
Save properties
Click Save.
8
Access Users and Groups
If the Assignment required? setting is set to “No,” you can skip the remaining steps in this section and continue to the next section. If it is set to “Yes,” proceed with the following steps to assign users and groups.
Under Manage, select Users and Groups.
9
Add user or group
On the menu, select + Add user/group.
10
Select users and groups
On the Add Assignment dialog, select the link under Users and groups.
11
Choose users and groups
A list of users and security groups is displayed. You can search for a specific user or group or select multiple users and groups that appear in the list.
12
Confirm selection
After you have selected your users and groups, select Select.If you see the message below, it means that a free tier is being used. You can only add users (not groups) to the Passport Enterprise App.
13
Complete assignment
Select Assign to finish the assignment of users and groups to the app.
14
Verify assignment
Confirm that the users and groups you added appear in the Users and groups list.
15
Review configuration
With this portion of the Entra ID configuration complete, review the remaining sections of this article for your Microsoft Entra ID environment.
Microsoft Entra ID Conditional Access Considerations
Microsoft Entra ID Conditional Access is included with Microsoft Entra ID Premium or better. Be sure to turn off both per-user MFA and Security defaults before you turn on Microsoft Entra ID Conditional Access policies.
When using theMac Login Passport Configurationonly: If Entra ID is configured with a Microsoft Entra ID Conditional Access policy that specifies MFA as a requirement and specifies all or specific cloud apps, you’ll need to exclude the Enterprise application that you use for Passport from that policy. Another way to describe such a policy is that the policy uses both of these criteria:
Assignments: Target resources: Cloud apps: All cloud apps or Select apps
Access controls: Grant: Grant access: Require multifactor authentication
Here’s an example of a policy that you don’t need to modify because it doesn’t use both of the criteria above (specifically, although it has the grant of Require multifactor authentication, it doesn’t have the assignment for Target resources).
Here’s an example of a policy that you do need to modify to exclude the Enterprise application for Iru Passport because the policy uses both criteria:
For you to exclude the Enterprise application, it needs to have a Redirect URI value, as seen in step 8 in the create the app registration section of this article.
On the Protection menu, select Conditional Access.
3
Access Policies
On the Conditional Access page, select Policies.
4
Review policies
Confirm that the portal displays each policy with a Policy Name and a State (among other information).
5
Select active policy
Select a policy that has the State of On.
6
Check and access target resources
If the Target resources section displays No target resources selected, return to the previous step and select the next policy. Otherwise, click the link under Target resources.
7
Exclude cloud apps
Click Exclude.
8
Review excluded apps
Review the list of excluded cloud apps (there may be no excluded cloud apps). If the Enterprise app for Iru Passport is already excluded, you can return to step 3 and proceed to the next policy.
9
Select excluded cloud apps
Click the text link under Select excluded cloud apps.
10
Search for Passport app
In the Search field, enter the name of the Enterprise app you use for Iru Passport. Note that the search doesn’t just search for any part of the name; you need to enter at least the start of the name.
11
Select Passport app
Select the checkbox for your Enterprise app for Iru Passport from the search results.
12
Confirm selection
At the bottom of the Select excluded cloud apps blade, click Select.
13
Verify exclusion
Confirm that the Enterprise app was added to the list of excluded apps.
14
Save policy
In the lower-left corner of the page, click Save.
15
Repeat for other policies
Go back to step 3 and repeat for the next policy until you have examined or updated every Conditional Access policy.
If you want Passport to set each user’s Mac account type from Entra ID security group membership, collect each group’s Object ID in the Microsoft Entra admin center using the steps in this section. You will use those values under User provisioning on the Passport Library Item Iru Endpoint tab. For more detail on this mode, see User provisioning in Configure the Passport Library Item.The number of security groups supported by Entra is 150 for SAML assertions. In larger organizations, the number of groups where a user is a member might exceed the limit that Microsoft Entra ID applies before emitting groups claims in a token. Exceeding this limit will cause Microsoft Entra ID to completely omit sending group claims in the token.
1
Access Groups
Sign in to the Microsoft Entra admin center. In the Identity navigation menu on the left, open Groups and select All groups.
2
Select group
Select the group that you want to use.
3
Copy Object ID
Copy the Object ID for that group.
4
Repeat for additional Entra ID groups
For each additional Entra ID group you want to use, repeat Select group and Copy Object ID. Keep the Object ID values in a secure document until you enter them on the Iru Endpoint tab.
Configure Authentication mode and User provisioning in the Passport Library Item on the Iru Endpoint tab.
If you have not already, use Configure the Passport Library Item to add the Passport Library Item and basic settings. The steps below are Microsoft Entra ID Mac Login fields in the Passport Library Item; use the Application (client) ID and OpenID Connect metadata URL from the Microsoft Entra ID tab.
If you want Passport to set each user’s Mac account type from Entra ID security group membership, use the steps below under User provisioning on the Passport Library Item Iru Endpoint tab. Collect each group’s Object ID in Entra ID first. See User Account Provisioning via Passport on the Microsoft Entra ID tab.
1
Configure user account type
In the User provisioning section, open User account type and select Specify per identity provider group.
2
Choose fallback account type
With User account type set to Specify per identity provider group, open the account type drop-down below it and select Administrator or Standard user. If a user’s IdP group membership returns both Administrator and Standard account types, the user is designated an Administrator.
3
Enter Object IDs
In each Identity provider group field, enter the Entra ID group Object ID as a GUID, not the group display name.
4
Set account types
For each Identity provider group row, set the Account type as appropriate.
5
Save configuration
Click Save.
When the Passport Library Item is saved, return to the Microsoft Entra ID tab if you need to change the app registration, Conditional Access exclusions, or group Object IDs.