title | description | ms.service | ms.subservice | ms.topic | ms.date | ms.author | author | manager | ms.reviewer | ms.custom |
---|---|---|---|---|---|---|---|---|---|---|
Microsoft Entra certificate-based authentication on Apple devices |
Learn about Microsoft Entra certificate-based authentication on Apple devices that run macOS or iOS |
entra-id |
authentication |
how-to |
03/04/2025 |
justinha |
justinha |
femila |
vimrang |
has-adal-ref |
This topic covers Microsoft Entra certificate-based authentication (CBA) support for macOS and iOS devices.
Devices that run macOS can use CBA to authenticate against Microsoft Entra ID by using their X.509 client certificate. Microsoft Entra CBA is supported with certificates on-device and external hardware protected security keys. On macOS, Microsoft Entra CBA is supported on all browsers and on Microsoft first-party applications.
Edge | Chrome | Safari | Firefox |
---|---|---|---|
�� | ✅ | ✅ | ✅ |
Microsoft Entra CBA today isn't supported for device-based sign-in to macOS machines. The certificate used to sign in to the device can be the same certificate used to authenticate to Microsoft Entra ID from a browser or desktop application, but the device sign-in itself isn't supported against Microsoft Entra ID yet.
Devices that run iOS can use certificate-based authentication (CBA) to authenticate to Microsoft Entra ID using a client certificate on their device when connecting to:
- Office mobile applications such as Microsoft Outlook and Microsoft Word
- Exchange ActiveSync (EAS) clients
Microsoft Entra CBA is supported for certificates on-device on native browsers and on Microsoft first-party applications on iOS devices.
- iOS version must be iOS 9 or later.
- Microsoft Authenticator is required for Office applications and Outlook on iOS.
On-device certificates are provisioned on the device. Customers can use Mobile Device Management (MDM) to provision the certificates on the device. Since iOS doesn't support hardware protected keys out of the box, customers can use external storage devices for certificates.
- Only native browsers are supported
- Applications using latest MSAL libraries or Microsoft Authenticator can do CBA
- Edge with profile, when users add account and logged in a profile support CBA
- Microsoft first party apps with latest MSAL libraries or Microsoft Authenticator can do CBA
Edge | Chrome | Safari | Firefox |
---|---|---|---|
❌ | ❌ | ✅ | ❌ |
Applications | Support |
---|---|
Azure Information Protection app | ✅ |
Company Portal | ✅ |
Microsoft Teams | ✅ |
Office (mobile) | ✅ |
OneNote | ✅ |
OneDrive | ✅ |
Outlook | ✅ |
Power BI | ✅ |
Skype for Business | ✅ |
Word / Excel / PowerPoint | ✅ |
Yammer | ✅ |
On iOS 9 or later, the native iOS mail client is supported.
To determine if your email application supports Microsoft Entra CBA, contact your application developer.
Certificates can be provisioned in external devices like hardware security keys along with a PIN to protect private key access. Microsoft's mobile certificate-based solution coupled with the hardware security keys is a simple, convenient, FIPS (Federal Information Processing Standards) certified phishing-resistant MFA method.
As for iOS 16/iPadOS 16.1, Apple devices provide native driver support for USB-C or Lightning connected CCID-compliant smart cards. This means Apple devices on iOS 16/iPadOS 16.1 see a USB-C or Lightning connected CCID-compliant device as a smart card without the use of additional drivers or third-party apps. Microsoft Entra CBA works on these USB-A, USB-C, or Lightning connected CCID-compliant smart cards.
Security keys with certificates:
- Can be used on any device, and don't need a certificate to be provisioned on every device the user has
- Are hardware-secured with a PIN, which makes them phishing-resistant
- Provide multifactor authentication with a PIN as second factor to access the private key of the certificate
- Satisfy the industry requirement to have MFA on separate device
- Help in future proofing where multiple credentials can be stored including Fast Identity Online 2 (FIDO2) keys
Even though the native Smartcard/CCID driver is available on iOS/iPadOS for Lightning connected CCID-compliant smart cards, the YubiKey 5Ci Lightning connector isn't seen as a connected smart card on these devices without the use of PIV (Personal Identity Verification) middleware like the Yubico Authenticator.
- Have a PIV-enabled YubiKey with a smartcard certificate provisioned on it
- Download the Yubico Authenticator for iOS app on your iPhone with v14.2 or later
- Open the app, insert the YubiKey or tap over near field communication (NFC) and follow steps to upload the certificate to iOS keychain
- Install the latest Microsoft Authenticator app.
- Open Outlook and plug in your YubiKey.
- Select Add account and enter your user principal name (UPN).
- Select Continue and the iOS certificate picker appears.
- Select the public certificate copied from YubiKey that is associated with the user’s account.
- Select YubiKey required to open the YubiKey authenticator app.
- Enter the PIN to access YubiKey and select the back button at the top left corner.
The user should be successfully logged in and redirected to the Outlook homepage.
The iOS certificate picker shows all the certificates on both iOS device and the ones copied from YubiKey into iOS device. Depending on the certificate user picks, they may be taken to YubiKey authenticator to enter a PIN, or directly authenticated.
- Users should see a dialog informing you that too many PIN attempts have been made. This dialog also pops up during subsequent attempts to select Use Certificate or smart card.
- YubiKey Manager can reset a YubiKey’s PIN.
After CBA fails, the CBA option in the ‘Other ways to sign in’ link also fails. Is there a workaround?
This issue happens because of certificate caching. We're working on an update to clear the cache. As a workaround, select Cancel, retry sign-in, and choose a new certificate.
- Open Microsoft Authenticator app, select the three dots icon in the top right corner and select Send Feedback.
- Select Having Trouble?.
- For Select an option, select Add or sign into an account.
- Describe any details you want to add.
- Select the send arrow in the top right corner. Note the code provided in the dialog that appears.
How can I enforce phishing-resistant MFA using a hardware security key on browser-based applications on mobile?
Certificate-based authentication and Conditional Access authentication strength capability makes it powerful for customers to enforce authentication needs. Edge as a profile (add an account) works with a hardware security key like YubiKey and a Conditional Access policy with authentication strength capability can enforce phishing-resistant authentication with CBA.
CBA support for YubiKey is available in the latest Microsoft Authentication Library (MSAL) libraries, and any third-party application that integrates the latest MSAL. All Microsoft first-party applications can use CBA and Conditional Access authentication strength.
Operating system | Certificate on-device/Derived PIV | Smart cards/Security keys |
---|---|---|
iOS | ✅ | Supported vendors only |
Operating system | Chrome certificate on-device | Chrome smart card/security key | Safari certificate on-device | Safari smart card/security key | Edge certificate on-device | Edge smart card/security key |
---|---|---|---|---|---|---|
iOS | ❌ | ❌ | ✅ | ✅ | ❌ | ❌ |
Provider | iOS |
---|---|
YubiKey | ✅ |
- On iOS, users with certificate-based authentication will see a "double prompt", where they must select the option to use certificate-based authentication twice.
- On iOS, users with Microsoft Authenticator App will also see hourly login prompt to authenticate with CBA if there's an Authentication Strength policy enforcing CBA, or if they use CBA as the second factor.
- On iOS, an auth strength policy requiring CBA and an MAM app protection policy will end up in a loop between device registration and MFA satisfaction. Due to the bug on iOS, when a user uses CBA to satisfy MFA requirement, the MAM policy is not satisfied with error being thrown by server saying device registration is required, even though the device is registered. This incorrect error causes re-registration and the request is stuck in loop of using CBA to sign in and device need registration. Due to the above issues, CBA as a second factor is blocked on iOS and will be unblocked as soon as the fixes are fixed.