Intro
Integrating Domo with Microsoft Intune can be challenging, particularly when using Intune for mobile Single Sign-On (SSO) and policy enforcement. By default, Intune-managed devices are subject to strict authentication and security requirements that may block mobile access to Domo. This article explains how to resolve common issues when using Domo with Microsoft Intune, including failed mobile authentication and conflicts with security policies. By configuring Conditional Access, applying compliance policies, and leveraging the Enterprise SSO app extension on iOS, administrators can enable secure mobile login while maintaining organizational security requirements. Learn more about single-sign on (SSO) in Microsoft Intune .- Intro
- Prerequisites
- Sign in to the Intune Admin Center
- Add or locate the Domo app
- Configure Enterprise SSO app extension (for iOS)
- Configure Conditional Access policies
- Apply compliance and security settings
- Test the configuration
- Troubleshooting
- Additional resources
Prerequisites
Before you begin, make sure you have the following:- Admin access to the Microsoft Intune Admin Center
- The Domo mobile app installed on iOS or Android devices
- Existing SSO configuration for Domo
- Knowledge of your organization’s compliance and security policies
Step 1: Sign in to the Intune Admin Center
You can sign in to the Intune Admin Center by following these steps:
- Open a web browser and go to the Microsoft Endpoint Manager Admin Center .
- Sign in with your Microsoft 365 administrator credentials.
Step 2: Add or Locate the Domo App
When you have navigated to the Intune Admin Center, you can locate the Domo app by following these steps:
- In the left-hand navigation pane, select Apps → All apps .
- Check if the Domo app (iOS and/or Android) appears in the list.
- Select Add → iOS Store App or Android Store App .
- Search for Domo and select it.
- Click Add and save your changes.
Note:
Adding the app allows you to assign policies and configure SSO for managed devices.
Step 3: Configure Enterprise SSO App Extension (for iOS)
For iOS devices, Domo must be included in the Enterprise SSO app extension allowlist to support SSO without relying on browser prompts. This ensures that Domo can use system SSO on iOS while complying with your security requirements. To configure the Enterprise SSO app extension allowlist to support SSO without relying on browser prompts, follow these steps:
- Navigate to Devices → iOS/iPadOS → Configuration profiles .
- Create or edit a profile for Enterprise SSO App Extension .
- Add Domo’s bundle ID to the allowlist.
- Assign the profile to the appropriate user groups.
Step 4: Configure Conditional Access Policies
Conditional Access policies enforce security requirements while allowing Domo to authenticate on managed devices. You can configure Conditional Access policies by following these steps:
- In the left-hand navigation pane, select Azure Active Directory → Security → Conditional Access .
- Create a new policy or edit an existing one.
- Under Cloud apps or actions , add the Domo app .
- Assign the policy to the appropriate user groups.
- Configure conditions (e.g., compliant devices, approved client apps) as required.
- Click Enable Policy → On , then save.
Step 5: Apply Compliance and Security Settings
You can apply compliance and security settings by following these steps:
- Go to Device compliance > Policies .
- Create or update compliance policies for iOS and Android.
- Include security controls such as:
- Blocking jailbroken or rooted devices
- Requiring device encryption
- Enforcing strong passwords
- Save and assign the policies to targeted groups.
Note:
Your device always enforces compliance. Intune applies the required protections while Domo securely authenticates users with Apple’s
ASWebAuthenticationSession
.Step 6: Test the Configuration
You can test your configuration by following these steps:
- On a managed iOS or Android device, install or update the Domo app.
- Open the app and attempt to sign in with your SSO credentials.
- Confirm the following:
- Authentication succeeds without requiring the Intune-managed browser.
- Device compliance and security policies are applied as expected.