Configure Entra ID conditional access
Entra ID
conditional access- Verify that you have aMicrosoftaccount with anIntunelicense and with one of the following permissions in theEntraportal: global administrator, limited administrator with the Intune Service administrator role, or a custom role with the permissions described in KB 50341.
- In theMicrosoftEndpoint Manager admin center, in the section for Partner Compliance Management, addBlackBerry UEM Azure Conditional Accessas a compliance partner foriOSandAndroiddevices and assign it to users and groups.
- To use this feature, device users must meet the following requirements:
- Users must exist inEntra IDand must have a validIntunelicense. For more information, see Microsoft Intune licenses.
- If you synchronize your on-premisesActive DirectorywithEntra ID, users’ on-premisesActive DirectoryUPN must match theirEntra IDUPN.
- Users must be added toUEMas directory users.
- Users must have both theMicrosoft Authenticatorapp and theUEM Clientinstalled on their devices.
- In theUEMmanagement console, on the menu bar, clickSettings > External integration > Azure Active Directory Conditional Access.
- Click .
- Type a name for the configuration.
- In theAzure clouddrop-down list, clickGLOBAL.
- In theAzure tenant IDfield, type your organization’s tenant name in FQDN format or unique tenant ID in GUID format.
- UnderDevice mapping override, clickUPNorEmail.If you choose UPN, verify that theEntra IDtenant and all mapped directories share the same UPN value for users before you save the connection. After you save the connection, you cannot change the device mapping override.
- In theAvailable company directorieslist, select and add the appropriate company directories.
- ClickSave.
- Select the administrator account that you want to use to log in to your organization'sEntratenant.
- Accept theMicrosoftpermission request.
- On the menu bar, clickPolicies and Profiles > Policy > BlackBerry Dynamics. Perform the following steps for any BlackBerry Dynamics profile that you plan to assign to device users (for example, the default profile and any custom profiles).
- Open and edit the profile.
- SelectEnable UEM Client to enroll in BlackBerry Dynamics.
- ClickSave.
- Assign the profile to users and groups as necessary.
- On the menu bar, clickPolicies and Profiles > Networks and Connections > BlackBerry Dynamics connectivity. Perform the following steps for any BlackBerry Dynamics connectivity profile that you plan to assign to device users (for example, the default profile and any custom profiles).
- Open and edit the profile.
- In theApp serverssection, clickAdd.
- Search for and clickFeature - Azure Conditional Access.
- ClickSave.
- In theAzure Conditional Accesstable, click .
- In theServerfield, typegdas-.<UEM_SRP_ID>.<region_code>.bbsecure.com
- In thePortfield, type 443.
- UnderRoute type, clickDirect.
- ClickSave.
- Assign the profile to users and groups as necessary.
- Assign theFeature – Azure Conditional Accessapp to users or groups. For more information, see Manage user accounts and Manage a user group.
- When a user activates their device, they are prompted to register withActive Directoryconditional access. Users with activated devices are prompted to register withActive Directoryconditional access the next time they open theUEM Client.
- When you remove a device fromUEM, the device remains registered forEntra IDconditional access. Users can remove theirEntra IDaccount from the account settings in theMicrosoft Authenticatorapp, or you can remove the device from theEntraportal.