Configure Entra ID conditional access
Entra ID
conditional accessVerify that you meet the prerequisites for Entra ID conditional access.
- In theUEMmanagement console, on the menu bar, clickSettings > External integration > Entra ID Conditional Access.
- Click .
- Type a name for the configuration.
- In theEntra clouddrop-down list, clickGLOBAL.
- In theEntra tenant IDfield, type your organization’s tenant name in FQDN format or unique tenant ID in GUID format.
- UnderDevice mapping override, clickUPNorEmail.If you choose UPN, verify that theEntra IDtenant and all mapped directories share the same UPN value for users before you save the connection. After you save the connection, you cannot change the device mapping override.
- In theAvailable company directorieslist, select and add the appropriate company directories.
- ClickSave.
- Select the administrator account that you want to use to log in to your organization'sEntratenant.
- Accept theMicrosoftpermission request.
- On the menu bar, clickPolicies and Profiles > Policy > BlackBerry Dynamics. Perform the following steps for any BlackBerry Dynamics profile that you plan to assign to device users (for example, the default profile and any custom profiles).
- Open and edit the profile.
- SelectEnable UEM Client to enroll in BlackBerry Dynamics.
- If you want to delay the conditional access enrollment process until theMicrosoft Authenticatorapp is installed on devices, selectStart conditional access enrollment after authentication broker is installed.
- ClickSave.
- Assign the profile to users and groups as necessary.
- On the menu bar, clickPolicies and Profiles > Networks and Connections > BlackBerry Dynamics connectivity. Perform the following steps for any BlackBerry Dynamics connectivity profile that you plan to assign to device users (for example, the default profile and any custom profiles).
- Open and edit the profile.
- In theApp serverssection, clickAdd.
- Search for and clickFeature - Azure Conditional Access.
- ClickSave.
- In theAzure Conditional Accesstable, click .
- In theServerfield, typegdas-.<UEM_SRP_ID>.<region_code>.bbsecure.com
- In thePortfield, type 443.
- UnderRoute type, clickDirect.
- ClickSave.
- Assign the profile to users and groups as necessary.
- Assign theFeature – Azure Conditional Accessapp to users or groups. For more information, see Manage user accounts and Manage a user group.
- Create and configure a compliance profile and assign the profile to users and groups as necessary. The following table details howUEMcompliance actions are reported toIntune:UEMcompliance enforcement actionBehaviorEnforcement action: Monitor and logNothing is reported toIntune.Enforcement action:
- Untrust
- Delete only work data
- Delete all data
UEMnotifiesEntra IDafter all user prompts have expired.Enforcement action forBlackBerry Dynamicsapps: Monitor and logNothing is reported toIntune.Enforcement action forBlackBerry Dynamics:- Do not allowBlackBerry Dynamicsapps to run
- DeleteBlackBerry Dynamicsapp data
UEMnotifiesEntra IDas soon as the compliance violation is detected. - Install both theUEM Clientand theMicrosoft Authenticatorapp on users' devices. You can assign and deploy theMicrosoft Authenticatorapp withUEM(see Adding public apps to the app list), or you can instruct users to download it themselves.
- Depending on the email client that your organization wants to use, you must complete additional steps to ensure that the mail client can validate and communicate withEntra:
- ForBlackBerry Work, see Configuring the BlackBerry Work app configuration for Entra ID conditional access in theBlackBerry WorkAdministration Guide.
- For theiOSnative mail client, see KB 94163.
- When a user activates their device, theUEM Clientprompts the user to register withEntraconditional access. Users with activated devices are prompted to register withEntraconditional access the next time they open theUEM Client.Instruct users to initiate the registration withEntrausing theUEM Client, not using any sign-in options withinMicrosoft Authenticator. The registration prompt from theUEM Clientwill openMicrosoft Authenticatorto prompt the user for credentials and to complete the registration process.
- After a user activates a device withUEM, you can check the user's device properties inMicrosoftEndpoint Manager to confirm that it was registered withEntraas expected. The name of the device will be in the following format:<username>-<platform>unknown unknown -<xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx>.
- If you change the scope of users or groups in theEntrapartner compliance configuration, in theEntraportal, navigate to the security permissions forBlackBerry UEMConditional Access and grant administrator consent forBlackBerryagain.
- When you remove a device fromUEM, the device remains registered forEntra IDconditional access. Users can remove theirEntra IDaccount from the account settings in theMicrosoft Authenticatorapp, or you can remove the device from theEntraportal.