Forum Discussion

beedy0712's avatar
beedy0712
Copper Contributor
Dec 04, 2024

Access Issues due to supervised Device

Hello

we have Supvised (ADE) and user affinity iOS devices in our company. The users can log on to their device via their Modern Auth and the whole thing is managed with Intune.

As a company, we have access to Azure Virutell clients (Win 11) hosted by our customers. If I now want to access this virtual Azure client via my supervised iPad and the iOS App Windows App, I receive the message: ‘Warning: incorrect configuration. The administrator wants the apps on this device to be managed via the ‘xxx’ account. [...] To access company data via the ‘yyy’ account, you must unregister your device from the company portal’

Is it possible to define exceptions in Intune so that I can log on to the virtual client with credentials other than those stored in the company portal?

 

best regards

  • Ankido's avatar
    Ankido
    Iron Contributor

    Potential Solutions:

    1. Review App Protection Policies (APP):
      • Check if App Protection Policies enforce all apps to use the corporate account.
      • Modify the policy to allow exceptions for the Microsoft Remote Desktop app (or the specific app used for AVD), permitting it to use alternative accounts or exempt it from the policy.
    2. Set Up Conditional Access Exceptions:
      • In Azure AD Conditional Access, create a policy to exclude specific apps (like the AVD app) from requiring managed devices or corporate accounts.
    3. Create a Custom Profile in Intune:
      • Configure a special Device Configuration Profile in Intune to allow apps to use multiple accounts. This option may pose security risks and should align with the organization’s compliance policies.
    4. Use an Unmanaged Device:
      • If exceptions are not allowed by corporate policy, consider using an unmanaged device (not supervised by Intune) to access the Azure Virtual Desktop.

     

    Plz let me know if the issue is resolved

  • Ankido's avatar
    Ankido
    Iron Contributor

    Potential Solutions:

    1. Review App Protection Policies (APP):
      • Check if App Protection Policies enforce all apps to use the corporate account.
      • Modify the policy to allow exceptions for the Microsoft Remote Desktop app (or the specific app used for AVD), permitting it to use alternative accounts or exempt it from the policy.
    2. Set Up Conditional Access Exceptions:
      • In Azure AD Conditional Access, create a policy to exclude specific apps (like the AVD app) from requiring managed devices or corporate accounts.
    3. Create a Custom Profile in Intune:
      • Configure a special Device Configuration Profile in Intune to allow apps to use multiple accounts. This option may pose security risks and should align with the organization’s compliance policies.
    4. Use an Unmanaged Device:
      • If exceptions are not allowed by corporate policy, consider using an unmanaged device (not supervised by Intune) to access the Azure Virtual Desktop. 

    Please let me know if the issue is resolved

    • beedy0712's avatar
      beedy0712
      Copper Contributor

      Hello Ankido,

       

      thank you for replying. 

       

      Regarding APP: I don't find any options to modify the policy to allow exceptions for the Microsoft Remote Desktop app (or the specific app used for AVD), permitting it to use alternative accounts or exempt it from the policy.

      • beedy0712's avatar
        beedy0712
        Copper Contributor

        Can someone be more specific about the steps to be done? Ankido suggestions are the same ChatGPT is giving me. But these are very unprecised. 

  • ENGlockling's avatar
    ENGlockling
    Copper Contributor

    Yes, you can exclude that app from the app protection policy that is currently assigned to the identity that you're trying to sign-in with. That's most likely where the restriction is coming from.

  • beedy0712's avatar
    beedy0712
    Copper Contributor

    I guess when no one is answering, this is mission impossible... 🧗‍♂️

Resources