Start in Microsoft 365 Admin Centre and browse to Azure Active Directory
Browse all services and click “App Registrations”
Click “New Registration”
Enter application details and URL
Start in Microsoft 365 Admin Centre and browse to Azure Active Directory
Browse all services and click “App Registrations”
Click “New Registration”
Enter application details and URL
Intune – Mobile Device Management – App Protection Policy in Intune App Protection
Scenario – We want to securely publish a corporate app (OneDrive) to users who will be using their own mobile ( iOS) devices. We want to protect the corporate data used in the app and establish authentication before accessing it. Users should not be able to copy and paste data directly from the app on to their own device.
We need to create an an App Protection Policy in Intune App Protection.
For more in-depth detail:
https://docs.microsoft.com/en-us/mem/intune/apps/apps-add
https://docs.microsoft.com/en-us/mem/intune/apps/apps-deploy
https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-policy-settings-ios
Create an App Protection Policy
or
Some legacy applications don’t support MFA. This is a solution to enable the apps to continue to function when MFA is enabled for a user in Office365.
How to create a “Additional Security Verification App Passwords”
Browse to https://portal.office.com/account/
Click “Security & Privacy” then click “Manage Security and Privacy”
Expand / Click on “Additional Security Verification”
Click “Create and manage app passwords”
Click “Create”
Enter a Name , example “Diary Sync” and click “Next”
Click “copy password to clipboard” (YOU NEED THIS PASSWORD)
(password above example only)
Some might get this error. Copy the password. (short cut to copy > Ctrl +A, then Ctrl + C)
(password above example only)
Click “Close”
You now have an application password which you can use with your legacy application without MFA causing any integration problems