Configuring macOS Platform SSO using Omnissa Access and Workspace ONE UEM

Overview

Traditionally, end-user authentication on macOS devices has relied on local accounts, posing challenges for IT admins in ensuring adherence to password best practices. Mobile device management (MDM) offers solutions, enabling organizations to enforce security policies and configure devices to sync with an LDAP domain. However, these options still present difficulties for both IT admins and end users. IT admins continue managing multiple tools and workflows for device access and security, while end users remain burdened with remembering multiple passwords for their devices and various applications.

Platform SSO

At WWDC 2023, Apple introduced Platform Single Sign-On, a game changer that simplifies user authentication. Platform SSO allows users to seamlessly synchronize their local account credentials with their organization’s identity provider, eliminating the need to remember multiple passwords. Users can log into their devices using their corporate account and password or even access their device without a password using other methods of authentication.

A diagram of a single sign-on extension

AI-generated content may be incorrect.

Platform SSO authentication

Platform SSO offers IT administrators four user authentication options:

  • Password – This option synchronizes the end user’s local credentials with the identity provider, allowing the user to log into their device using their identity provider credentials.
  • Secure Enclave Key – With this option, the end user can unlock their macOS device with Touch ID or Apple Watch using a Secure Enclave-backed key to authenticate with the identity provider, eliminating the need for a password.
  • SmartCard – The end user can use a SmartCard to authenticate with the identity provider when logging into their device. This option is only available for macOS 14 and higher.
  • Password with WS-Trust – A federated identity provider, which facilitates federated authentication across multiple security domains, can use the local account password for authentication.

The availability of the above options is dependent on what the Identity Provider supports in their solution.

An MDM solution, such as Workspace ONE UEM, is necessary to enable Platform SSO on macOS devices. The required applications and device profiles must be pushed to the devices. It’s worth noting that if a macOS device is unenrolled from MDM, it will also be unregistered from the configured identity provider.

Platform SSO device registration process

The overall Platform SSO device registration process comprises several steps and prompts the user at different stages. The process outlined below is general and may differ depending on the identity provider being utilized. This process applies to macOS Ventura 13 to Sequoia 15.

The process commences when a user enrolls and logs into an MDM-managed macOS device. This initial login will be made using a local device account.

A diagram of a software process

AI-generated content may be incorrect.

An MDM solution, such as Workspace ONE UEM, installs the SSO extension app created by the identity provider. Subsequently, it installs the device profile, which contains the SSO extension payload to configure Platform SSO.

The user is prompted to register their device with the identity provider. During this process, the user will be required to provide their local device credentials. Additionally, the registration process involves authenticating with the user’s identity provider credentials. A new account will be created on the device matching the user’s identity provider credentials. If required by the identity provider, the user may be prompted to enable Passkeys and Passwords in the device’s System Settings.

Once the registration is complete, the end user can log out and log back in to the device using their identity provider credentials.

Supported identity providers

For Platform SSO to function, identity providers must integrate the framework into their platform solution. Two identity providers that have fully embraced Apple’s Platform SSO are Okta and Microsoft Entra ID. The following Tech Zone articles provide guidance on configuring Workspace ONE UEM to connect these two platforms to your Apple device fleet.

Omnissa Access also supports the Platform SSO framework, allowing administrators to utilize almost any federated identity provider, even if it doesn’t natively support Platform SSO. By configuring Omnissa Access as the identity provider for Platform SSO, organizations can authenticate users to macOS devices using Active Directory and other third-party identity providers. Omnissa Access can facilitate authentication with any identity provider that supports the OAuth 2.0 Password Grant flow.

Purpose of this tutorial

This tutorial walks you through setting up the device profiles required to use Omnissa Access as the identity provider for Platform SSO on your macOS devices. The sections included in this guide are:

  • Platform SSO with Omnissa Access
  • Configuring Omnissa Access as a Platform SSO identity provider
  • End user experience
  • Troubleshooting Platform SSO

However, this guide does not cover federating identity providers in Omnissa Access. For information on integrating identity providers with Omnissa Access, refer to Directory Integration with Omnissa Access.

Audience

This operational tutorial is intended for IT professionals and Workspace ONE administrators of existing production environments. 

Both current and new administrators can benefit from using this tutorial. Familiarity with macOS, XML, and basic scripting is assumed. 

Knowledge of additional technologies such as Omnissa Intelligence and Omnissa Workspace ONE® UEM is also helpful.

Platform SSO with Omnissa Access

This section offers a brief introduction to Omnissa Access and highlights its essential features. It also delves into how Access integrates with Platform SSO, while also outlining the current limitations of this feature.

Omnissa Access

In the rapidly evolving IT landscape, where user identities are becoming increasingly diverse, encompassing more than just a username and password. Omnissa Access combines user identity with factors like device and network information to make intelligent, conditional access decisions for applications. This seamless integration enables organizations to provide a consistent application access experience across various devices, ensuring quick and secure access.

A screenshot of a computer

AI-generated content may be incorrect.

Some of the key advantages of the Omnissa Access service for Workspace ONE include:

  • Single Sign-On (SSO): Seamlessly integrate SSO with Omnissa Workspace ONE® Intelligent Hub to provide single sign-on access to web, SaaS, mobile, and legacy applications.
  • Access Broker: Collaborate with leading identity providers to reduce deployment time and enhance the security of access to any application.
  • Risk-Based Conditional Access: Develop and implement access policies that leverage device enrollment, network, user behavior, location, and third-party security signals and information.
  • Adaptive Multifactor Authentication (MFA): Offer native MFA or integrate with existing MFA providers to bolster application and data security while providing a frictionless experience for end users.

The Omnissa Access console serves as a centralized management hub, enabling you to manage users and groups, configure and manage authentication and access policies, and add resources to the catalog while managing their entitlements. Additionally, you can configure the integration with Workspace ONE UEM.

The primary tasks performed through the Omnissa Access console involve managing user authentication and access policies, as well as granting users access to resources. Other tasks support this core function by providing more granular control over which users or groups are entitled to which resources under specific conditions.

Using Omnissa Access with Platform SSO

Omnissa Access can be configured as the identity provider for Platform SSO, allowing authentication with third-party identity providers like Active Directory, Google Workspaces, Ping, and others. Omnissa Access supports two primary identity source configurations for Platform SSO: Active Directory and any identity provider that supports the OAuth 2.0 Password Grant flow. Once configured, the user’s macOS local password is synchronized with their third-party identity provider password.

The provided diagram offers a high-level overview of how Platform SSO with Omnissa Access operates.

  1. MDM profile provisioning – An administrator creates a SSO Extension profile in Workspace ONE UEM and assigns it to one or more smart groups containing macOS devices. Workspace ONE UEM provisions the profile to those assigned devices.
  2. Configuration – The MDM profile pushed to the device by Workspace ONE configures the SSO agent. The SSO agent is part of the macOS operating system and manages device/user registration and device logins.
  3. Device / user registration – Once the configuration has been applied to the SSO agent, the Platform SSO orchestration begins. The user is prompted to register with the identity provider, in this case, Omnissa Access. The registration process registers both the user and the device with Omnissa Access. Access, in turn, will issue a token which serves as a unique identifier and is stored in the macOS keychain.
  4. macOS login – Once the registration process is complete, the user’s identity provider password is synchronized with their local user account in macOS. When a user logs into macOS, they use their identity provider credentials to access their device.
  5. SSO login – If the user launches an app that requires authentication with their identity provider account, the Platform SSO extension within Intelligent Hub will automatically authenticate the user with the identity provider credentials provided during login.

In case the user changes its identity provider password, Omnissa Access and Platform SSO will automatically synchronize the new password with the user’s local account on the device.

Limitations

Using Omnissa Access as an identity provider does have two limitations that you must be aware of prior to implementation.

  • Multi-user macOS devices are not supported. While macOS allows multiple user accounts, Platform SSO with Omnissa Access currently only supports single-user devices. Consequently, macOS devices shared among multiple users cannot be configured to use Platform SSO with Omnissa Access.
  • Omnissa Access currently only supports Platform SSO, version 1.0.

Configuring Omnissa Access as a Platform SSO identity provider

This section outlines the essential requirements and process for configuring Omnissa Access as the Platform SSO identity provider for your macOS devices. It does not delve into specific identity providers or the process of federating them with Omnissa Access. This document assumes that your Workspace ONE UEM tenant is already integrated with your Omnissa Access tenant and does not cover the integration process.

The steps described in this section include:

  • Required pre-configurations
  • Software requirements
  • Configuring the Workspace ONE UEM root certificate in Omnissa Access
  • Creating a SCEP profile in Workspace ONE UEM
  • Creating a SSO Extension profile in Workspace ONE UEM

Required pre-configurations

There are a few configurations that this document assumes already exist within your Omnissa Access and Workspace ONE UEM tenants. This guide will not provide detailed instructions for each of these items. It is recommended that you consult Omnissa product documentation for more information.

NOTE: Before proceeding, ensure that your administrative account in Omnissa Access has Manage Settings privileges for the Identity and Access Management service. To learn how to manage roles in Omnissa Access, please read, Managing Administrator Roles in Omnissa Access.

Integrating third-party identity providers with Omnissa Access

If you’re using a third-party Identity Provider, it must be integrated with Omnissa Access as an OpenID Connect identity provider. To learn how to integrate an OpenID Connect identity provider, refer to the guide titled, Add and Configure an OpenID Connect Third-Party Identity Provider in Omnissa Access. This OpenID Connect identity provider must be configured to use the OAuth 2.0 Password Grant flow within the identity provider.

NOTE: The setting name may vary depending on the identity provider. For instance, in Okta, the setting is called “Resource Owner Password.”

NOTE: It’s unnecessary to enable the OAuth 2.0 Password Grant flow with a federated instance of Active Directory.

In Omnissa Access, it’s also essential to configure OAuth 2.0 Management to utilize the OAuth 2.0 Password Grant flow for password validation. This configuration can be made in the Omnissa Access console under the OAuth 2.0 Management > Password Validation tab. However, this configuration is unnecessary if you’re using a federated Active Directory instance.

A screenshot of a login page

AI-generated content may be incorrect.

Authentication and directory synchronization settings

Your source of authentication can be configured to either Workspace ONE UEM or Omnissa Access. Platform SSO supports both configurations. This can be configured in the Workspace ONE UEM console under Groups & Settings > All Settings > Devices & Users > General > Enrollment.

A screenshot of a computer

AI-generated content may be incorrect.

Additionally, the users you want to enable Platform SSO for must exist in both Omnissa Access and Workspace ONE UEM, and the externalId attribute is mandatory for all users. The values for this attribute must be consistent between Omnissa Access and Workspace ONE UEM.

A screenshot of a login page

AI-generated content may be incorrect.

Software requirements

To use Omnissa Access as an identity provider for Platform SSO, you must fulfill the following requirements.

  • Workspace ONE Access Cloud
  • Workspace ONE UEM, version 24.10 or higher
  • Intelligent Hub for macOS, version 25.11 or higher
  • Devices running macOS version 14 (Sonoma) or higher

Configuring the Workspace ONE UEM root certificate in Omnissa Access

Although your Workspace ONE UEM and Omnissa Access tenants are already integrated, it’s essential to establish a specific trust between the two products for authentication with Platform SSO. This certificate import will create a trust between Workspace ONE UEM and Omnissa Access authentication adapters.

To establish a trust between Workspace ONE UEM and Omnissa Access authentication adapters, follow these steps:

  1. In the Workspace ONE UEM console, select Groups & Settings, and then All Settings.
  2. Expand System and expand Enterprise Integration. Expand Workspace ONE Access and select Configuration.
  3. Click the Export button to download the Workspace ONE UEM Issuer Certificate.

A screenshot of a computer

AI-generated content may be incorrect.

  1. In the Omnissa Access console, click the Integrations tab, and expand Platform Single Sign-on for macOS.
  2. Click Upload Certificate to upload the certificate you just downloaded from the Workspace ONE UEM console.

A screenshot of a computer

AI-generated content may be incorrect.

Creating a SCEP profile in Workspace ONE UEM

To use Omnissa Access as an identity provider for Platform SSO, you will need to create a SCEP profile and assign it to your users.

NOTE: You may already have this configured in your Workspace ONE UEM tenant. If so, you can ignore these steps and move onto the next section, Creating a SSO Extension profile in Workspace ONE UEM.

To configure and deploy a SCEP profile, do the following steps:

  1. Within the Workspace ONE UEM console, select Resources and then click Profiles.
  2. Click the Add dropdown and select Add Profile.
  3. Select Apple macOS.
  4. For Management Type, select Imperative and select User for the Context. Click Next.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Enter a name for the profile. For example, you might name the profile, macOS – SCEP PSSO.
  2. Scroll down the list of payloads until you find SCEP. Click Add.
  3. In the Credential Source dropdown, select Air-Watch CA.
  4. In the Certificate Authority dropdown, select AirWatch Certificate Authority.
  5. From the Certificate Template dropdown, select Single Sign-on.
  6. Deselect Allow export of private key from Keychain.

A screenshot of a login screen

AI-generated content may be incorrect.

  1. Click Next.
  2. Scroll down to view Assigned Groups and click in the search box. From the list of assignment groups that appear, select the appropriate group. For example, select All Corporate macOS Devices.
  3. Select Auto for the Assignment Type.
  4. Click Save & Publish.

Creating a SSO Extension profile in Workspace ONE UEM

The SSO Extension for macOS configures the necessary settings for enabling Platform SSO on macOS devices. It also configures single sign-on for native macOS apps and websites. The properties in this profile define the authentication source, authentication method (such as password, secure enclave, etc.), and other options required for Platform SSO. However, the fields required to configure Platform SSO for identity providers other than Omnissa Access may vary. The procedure defined in this section is specific to configuring Omnissa Access as the identity provider used by Platform SSO.

To configure the SSO Extension profile for Omnissa Access, follow the below outlined steps:

  1. Within the Workspace ONE UEM console, select Resources and then click Profiles.
  2. Click the Add dropdown and select Add Profile.
  3. Select Apple macOS.
  4. For Management Type, select Imperative and select Device for the Context. Click Next.
  5. Enter a name for the profile. For example, you might name the profile, macOS – PSSO.
  6. Scroll down the list of payloads until you find SSO Extension. Click Add.
  7. Set the Extension Type to Generic.
  8. Enter com.ws1.hub.mac.SSOExtension for the Extension Identifier.
  9. From the Type dropdown, select Redirect.
  10. Enter S2ZMFGQM93 for the Team Identifier.
  11. For URLs, enter https://<AccessTenantFQDN>/mpsso, where <AccessTenantFQDN> represents the FQDN for your Omnissa Access tenant.

A screenshot of a computer

AI-generated content may be incorrect.

  1. As you scroll down, you will find two dropdown menus labeled Authentication method. Leave the first dropdown as the default value of Not Configured and select Password in the second dropdown.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Scroll down until you see the Platform SSO section. Enter a name in the Account Display Name field. This name will be visible to end users during registration.
  2. Click Enable for Use shared device keys.
  3. At the bottom of the payload, you will find a text box under Additional Settings section labeled Custom XML. Copy and paste the following XML code in the text box.
<dict>
<key>AuthorizationRules</key>
<array>
    <dict>
        <key>URLPrefix</key>
        <string>https://<AccessTenantFQDN>/</string>
        <key>ExtensionManaged</key>
        <false/>
    </dict>
</array>
</dict>

NOTE: Change <AccessTenantFQDN> to the FQDN for your Omnissa Access tenant.

  1. Scroll down the list of payloads until you find System Extensions. Click Add.
  2. Click the Add System Extension Type button.
  3. In the Team Identifier field, enter S2ZMFGQM93.
  4. In the Allowed System Extensions section, enter S2ZMFGQM93 in the Team Identifier field and com.ws1.hub.mac.SSOExtension for the Bundle Identifier.
  5. Scroll down to the Non Removable From UI System Extensions section. Click the X next to the empty field.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Scroll down to the Non Removable System Extensions section. Enter S2ZMFGQM93 in the Team Identifier field and com.ws1.hub.mac.SSOExtension for the Bundle Identifier.
  2. Scroll up the list of payloads until you find Associated Domains. Click Add.
  3. For App Bundle ID, enter S2ZMFGQM93.com.ws1.hub.mac, and for Domains, enter authsrv:<AccessTenantFQDN>, where <AccessTenantFQDN> is the FQDN for your Omnissa Access tenant.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click Next.
  2. Scroll down to view Assigned Groups and click in the search box. From the list of assignment groups that appear, select the appropriate group. For example, select All Corporate macOS Devices.
  3. Select Auto for the Assignment Type.
  4. Click Save and Publish.

End user experience

This section briefly outlines the anticipated end-user experience during the device registration process.

Workspace ONE Intelligent Hub

Omnissa Workspace ONE Intelligent Hub is an application that provides a secure digital workspace for employees on any device, anywhere. Intelligent Hub serves as a central hub where employees can access all the necessary tools and resources to enhance their productivity, regardless of whether they are working on a desktop, mobile device, or in a web browser. This includes seamless single sign-on to a unified app catalog, people directory, support resources, and more. Additionally, Intelligent Hub facilitates the deployment of the Workspace ONE Assist client, enabling real-time remote support.

Omnissa Access utilizes the Intelligent Hub for macOS to facilitate authentication and single sign-on through Platform SSO. The Intelligent Hub must be installed on all macOS devices that will be configured to use Platform SSO.

Device registration

Once you’ve pushed the profiles you created earlier to your macOS devices, a notification pop-up will appear, reminding the user that registration is required.

A screenshot of a computer

AI-generated content may be incorrect.

Clicking on the notification initiates the registration process. The end user doesn’t need to launch or interact with the Intelligent Hub. To apply the Platform SSO configuration to their device, the end user will be prompted to authenticate using their local password.

Screenshot of a screenshot of a login screen

AI-generated content may be incorrect.

The end user will then be prompted to authenticate to Omnissa Access using their identity provider credentials to complete the device registration. Once the registration has completed, the end user will be notified.

A screenshot of a computer

AI-generated content may be incorrect.

To confirm that Platform SSO has been configured, the end user can open System Preferences on the macOS device. Then, selecting User & Groups, the user can click the Edit button for Network Account Server. If Platform SSO is configured, the SSO Extension will be listed as Registered under Platform Single Sign-on.

A screenshot of a computer

AI-generated content may be incorrect.

Troubleshooting Platform SSO

This section explores some common tasks you can employ to troubleshoot issues with Workspace ONE UEM and Platform SSO. While it’s not an exhaustive troubleshooting guide, it serves as a starting point.

Confirm the Platform SSO profile has been applied to the device

You can check the status of the profile in macOS Systems Settings. Under General > Device Management, you’ll find a list of all profiles applied to the device. Look for the Platform SSO profile. If you double-click on it, you can view the settings applied, including URLs, authentication methods, and so on. Ensure that these settings match what you configured in Workspace ONE UEM.

Screens screenshot of a device

AI-generated content may be incorrect.

Validate that device registration completed successfully

You can confirm the successful device registration with the identity provider by running the following command in Terminal on your macOS device:

app-sso platform -s

This command will provide detailed information about the Platform SSO registration. The key you’re specifically looking for is under Device Configuration. Look for registrationCompleted. A successful completion is indicated by a value of true.

A screenshot of a computer

AI-generated content may be incorrect.

Removing Platform SSO from a device

If necessary, you may need to remove Platform SSO as part of troubleshooting. The process may vary depending on the identity provider you’re using. For Omnissa Access, you’ll start by unassigning the Platform SSO profile mentioned earlier in the document under Creating a SSO Extension profile in Workspace ONE UEM.

Confirm that the profile has been removed from the device. You can validate this in two ways: first, check the list of profiles in System Settings under General > Device Management. Second, confirm that the SSO Extension is no longer listed as a network account server.

A screenshot of a computer

AI-generated content may be incorrect.

NOTE: Removing Platform SSO won’t reset the local user account’s password to its original state before the configuration was applied. The password will remain as the last synchronized value from the identity provider.

Summary and additional resources

Apple’s Platform SSO offers a more secure mechanism for logging into macOS devices, as well as providing a better experience for end users. By integrating with third-party identity providers, IT admins can increase the security of macOS devices by ensuring that end users must use their identity provider password to log into their macOS devices. Omnissa Access can be configured as the identity provider for Platform SSO, facilitating authentication with Active Directory or with a third-party identity provider.

Topics discussed included:

  • Platform SSO with Omnissa Access
  • Configuring Omnissa Access as a Platform SSO identity provider
  • End user experience
  • Troubleshooting Platform SSO

Additional resources

To learn about other supported identity providers that support Platform SSO, please check out these operational tutorials on Tech Zone.

You may also wish to read these additional operational tutorials from macOS on Tech Zone. 

Changelog

The following updates were made to this guide:

Date

Description of Changes

01/15/2026

Initial release

About the author and contributors

This tutorial was written by:

Additional contributions provided by:

  • Samidha Rege, Product Manager, Omnissa
  • Sandhya US, Product Specialist, Omnissa
  • Nandini Sharma, Product Specialist, Omnissa

Questions and feedback

For questions or feedback, send to tech_content_feedback@omnissa.com.

Filter Tags

Workspace ONE Workspace ONE Access Workspace ONE UEM Document Operational Tutorial Intermediate macOS