Microsoft Intune integration with the Staffbase enables you to apply
In this guide, you:
- Create a dedicated enterprise application in Microsoft Entra ID
- Configure API settings
- Prepare the application registration for Android and iOS
- Add API Permissions
- Enable Microsoft Authenticator
Prerequisites:
- You have Microsoft Intune.
- You have a working Microsoft Entra ID SAML SSO integration for Staffbase.
- You have one of the following permissions to configure provisioning in Entra ID:
- Application Administrator
- Cloud Application Administrator
- Global Administrator
- You have received the following app configuration details from Staffbase:
- Package name or bundle ID
- Signature hash
Create an enterprise application
You need to create a dedicated app for setting up Microsoft Intune. This application represents the Employee App in your identity environment and is used by MSAL to authenticate users.
- In Microsoft Azure, under Azure services, click Microsoft Entra ID.
- Navigate to Enterprise applications.
- Click New application.
- Click Create your own application.
The Create your own application dialog opens.
- Provide a name for the application. For example, Staffbase Employee App Intune Integration or something similar to help you instantly identify the application.
- Select Integrate any other application you don’t find in the gallery (Non-gallery).
- Click Create.
You have created an application to authenticate users using your Employee App.
Assigning users
After creating the enterprise application, you can decide which Entra ID users need in order to access the Employee App using the integration.
Staffbase recommends first adding a few users to test that everything works as expected.
- In the enterprise application you created, click Users and groups.
The Users and groups page opens. - Click Add user/group.
- Click None Selected.
The Users and groups dialog opens. - Search for the user or group you want to add and click Select.
- Click Assign.
You have assigned users or groups to the application.
Define app properties
You need to define the app properties to prevent sign-in restrictions at the Entra level for the Employee App.
The Assignment required setting only controls whether users are explicitly assigned to the Enterprise Application in Entra ID to sign in. It does not control Intune app targeting, App Protection Policy assignment, or conditional access. These are managed in Intune.
To prevent sign-in failures for users targeted correctly in Intune, set the Assignment required option to No.
- In the enterprise application you created, click Properties.
The Properties page opens. - Set Assignment required? to No.
- Click Save.
Expose an API
The Employee App must request access tokens during authentication. To allow this, you need to expose an API and define the required permission scope in Microsoft Entra ID.
This configuration enables the app to request delegated access on behalf of the signed-in user.
Add an application ID URI
- In Microsoft Entra admin center, navigate to App registrations > the enterprise app you created.
- Navigate to Expose an API.
- Click Add an Application ID URI.
The Application ID URI page opens.
- Click Add.
The Edit application ID URI dialog opens with the default application ID prefilled. - Click Save.
The Expose an API page opens. You have added the default application ID URI.
Add the permission scope
You need to replace appName with the enterprise application you created. For example, if your enterprise application is named Staffbase Employee App Intune Integration, replace appName with that name.
- In the Expose an API page, click Add a scope.
The Add a scope dialog opens. - In Scope name, enter
user_impersonation. - Set Who can consent? to Admins and users.
- In Admin consent display name, enter
Access appName SSO. - In Admin consent description, enter
Allow the application to access appName SSO on behalf of the signed-in user. - In User consent display name, enter
Access appName SSO. - In User consent description, enter
Allow the application to access appName SSO on your behalf. - Set State to Enabled.
- Click Add Scope.
Add authorized client applications
You need to add the Application (client) ID to authorized applications. You can find the Application ID from the overview.
- In the Expose an API page, click Add a client application.
The Add a client application dialog opens. - In Client ID, enter the Application ID.
- Under Authorized scopes, select
/user_impersonation. - Click Add application.
You have added the client application.
Configure mobile platforms
You need to add Android and iOS platforms to enable authentication on mobile devices. This configuration enables MSAL to correctly redirect users during authentication.
Prerequisite:
- You have the following values from Staffbase:
- Package Name/ Bundle ID
- Signing key signature (also known as Signature hash)
Add a platform for Android
- In the Microsoft Entra admin center, navigate to App registrations > the enterprise app you created.
- Navigate to Authentication.
- Click Add a platform.
The Configure platform dialog opens. - Click Android.
- In Package name, provide the name you received from Staffbase.
- In Signature hash, provide the value you received from Staffbase.
- Click Configure.
The Redirect URI and MSAL Configuration are added automatically.
Add a platform for iOS
- In the Microsoft Entra admin center, navigate to App registrations > the enterprise app you created.
- Navigate to Authentication.
- Click Add a platform.
The Configure platform dialog opens. - Click iOS/macOS.
- In Bundle ID, provide the name you received from Staffbase.
- Click Configure.
The Redirect URI and MSAL Configuration are added automatically.
Add API permissions
You need to provide API permissions to allow Intune to manage the Employee App.
- In the Microsoft Entra admin center, navigate to App registrations > the enterprise app you created > API permissions.
- Click Add a permission.
The Request API permissions dialog opens. - Search for and select Microsoft Mobile Application Management.
- Add Microsoft Mobile Application Management (delegated permission) under APIs my organization uses.
- Under Permissions, select DeviceManagementManagedApps.ReadWrite Read and Write the User’s App Management data.
- Click Add permissions.
The added permission appears under Configured permissions.
7. Click Grant admin consent for your tenant.
A confirmatory message dialog opens.
8. Click Yes.
You have added API permissions.
Enable Microsoft Authenticator
You need Microsoft Authenticator to use modern authentication with MSAL.
- In the Microsoft Entra admin center, navigate to Authentication methods.
- Ensure that Microsoft Authenticator is set to Enabled.
You have enabled Microsoft Authenticator.