Configuring conditional access for Microsoft Entra integration with IBM MaaS360
Use this integration to enable only trusted users and groups from compliant and managed devices in the Microsoft Entra Portal to access Microsoft-approved apps and services.
The IBM® MaaS360® integration with Microsoft to enforce device compliance through Microsoft Entra ID Conditional Access (CA) enables the synchronization of device compliance information with a Microsoft Entra ID tenant. This integration helps MaaS360 Device Trust information to be seamlessly used in Microsoft Entra ID Conditional Access rules. The Microsoft Endpoint Manager Partner Compliance Management capability enables this integration. For more information on this capability, see https://docs.microsoft.com/mem/intune/protect/device-compliance-partners.
- To enable CA for Microsoft Entra integration in your IBM MaaS360 Portal, contact IBM Support.
- When the IBM MaaS360 infrastructure is upgraded and the gateway IP address changes, help ensure to update any Microsoft Entra Conditional Access policies that use Network Assignments and the specific MaaS360 instance gateway IP address with the new IP address.
- IBM MaaS360 functions as a third‑party compliance partner and sends device compliance data to Microsoft Intune. Microsoft Intune synchronizes this information and uses it to determine device compliance status. In the Microsoft Entra ID portal, Microsoft Intune appears as the Mobile Device Management (MDM) authority for integration purposes only. IBM MaaS360 manages device enrollment and compliance.
Environment
- Microsoft Entra ID Conditional Access requires a Microsoft Entra ID Premium subscription.
- Device registration and user participation for device compliance require a Microsoft Intune license, which must be assigned to the target device users.
- The Microsoft Authenticator app must be installed on iOS and Android devices. Push this app as a managed app from the MaaS360 App Catalog. The Microsoft Authenticator app is required to register the device in Microsoft Entra ID.
- A valid subscription to Microsoft In tune is required. The Microsoft Intune licenses must be assigned to the users supported by this integration.
Configuration
- Configure for all users: Prompts all devices in the organization to register. This method works only on devices that complete the registration process.
- Configure specific groups: With this configuration, you must set up Directory sync, which
provides visibility into user group associations. For more information, see Directory sync for Microsoft Entra integration with MaaS360.
You can configure this service only for Microsoft Entra ID groups that MaaS360 manages. See step 3 in Migrating existing MaaS360 users and groups to sync from Microsoft Entra ID.
Onboarding workflow
- Go to https://endpoint.microsoft.com and sign in to Microsoft Entra account by using valid credentials.
- From the Microsoft Endpoint Manager admin center, select .
- Click Add compliance partner.
- On the Create Compliance Partner screen, go to the Basics tab and select IBM MaaS360 from the compliance partner list.
- Select Android from the platform list, and click Next.
- In the Assignments tab, select , and click Next.
- In the Review + create tab, review the settings, and click
Create.
You can see a message to indicate that the compliance partner was successfully created (tenant metadata is created on Intune). The Partner compliance management preview nowshows the partner-managed Android devices for IBM MaaS360.
- To configure partner-managed iOS devices, repeat the step 3, but choose iOS in step 3.a. Click Refresh on the Partner compliance management preview page and go to step 5.
- Log in to the IBM MaaS360 Portalwith your administrator username and password credentials.
- From the IBM MaaS360 Portal home page, go to .
- Configure the Tenant ID (the unique identifier for the Microsoft Entra
ID instance) and the
Client ID for the Microsoft
Entra account that is
enabled with the Intune license.
For detailed steps on registering the MaaS360 app in the Microsoft Entra ID tenant and generating the Client ID (Application ID), see Registering MaaS360 app in the Microsoft Entra ID tenant. For more information, see https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app?tabs=certificate.
- Click Configure. You are prompted to sign in to the Microsoft Entra Portal.
- Select your Microsoft Entra account from the list. The Permissions requested message for the unverified MaaS360 Microsoft Entra Device Compliance Data Update is displayed.
- Review the message and click Accept to allow the MaaS360 app permissions to specific resources from all users in your organization.
- If authentication is successful, the following message is displayed and you are redirected to
the MaaS360 Portal.
Registration is successful. Window will automatically close in 5 seconds - If authentication fails, the following message is displayed and you must review the settings
that you configured in the previous steps.
Registration has failed. Window will automatically close in 5 seconds
- If authentication is successful, the following message is displayed and you are redirected to
the MaaS360 Portal.
- Go to . By default, the Select user groups screen is displayed.
- From the Select user groups screen, select the user groups that you want to configure.
- To configure the service for all users, select All Users.
To suppress the Microsoft Authenticator setup notification on devices when Conditional Access is enabled for all users, select Suppress notification to set up Microsoft Authenticator checkbox.
- To configure specific Microsoft
Entra user groups,
select Specific groups.Follow the steps to select the required groups to synchronize.
- Click Edit.
- Click Manage groups to open the Manage groups page.
- Search the groups and select the group names in the Enabled groups section to add to the list.
- Click Confirm.
- To configure the service for all users, select All Users.