
:max_bytes(150000):strip_icc()/005-recover-email-password-from-os-x-keychain-1174067-75461e5bd5fa4810accdbcfd7bc181d3.jpg)
Open “Enterprise applications” -> “Admin consent requests” to do so.ĭetails like Name, Homepage URL, used Reply URLs can get reviewed. If they don’t act until the expiration date, the request will get rejected automatically.Īlternatively the Administrator can review the list of open requests in Azure AD. In that E-Mail they can click on “Review Request”, to review more details. The selected admins receive an E-Mail, which lists the details of the request. Step 3: Administrator reviews the Approval Request The user must enter a reason for the application request. The necessary permissions of the app are listed. When a users wants to use a new app, he’ll receive the info “ Approval Required”. Step 2: User requests Administrator-Consent In Default the requests expire after 30 days, which can be adjusted aswell. If required, you can enable to notify these administrators by email. Then click on “Select admin consent request reviewers” and select the Administrators, that should approve the requests. Under “Admin consent requests (Preview)” you can enable the option “Users can request admin consent to apps they are unable to consent to”. Open “Enterprise applications” -> “User settings” in Azure AD as an Administrator. This is also possible in addition to the one-time administrative approval from solution 1. Solution approach 2: Enable Administrator Consent requestĪlternatively, you can activate that users can request the approval of an app. The app should be listed in Azure AD under “Enterprise applications” -> “All applications” now.Īfterwards the users should be able to access their Calendar/Contacts in Exchange Online using iOS. The error AADSTS900561 may be ignored in this case. The query “Permission requested - Accept for your organization - Apple Internet Accounts” must be confirmed with “Accept”.Īfterwards an error is displayed, because the redirect URL points to. Step 3: Grant permission as admin for the whole Tenant The client_id in the URL is the ID of Apple Internet Accounts. The generated URL can then be accessed with Tenant Admin (Global Administrator) rights. The placeholder has to get replaced with the actual TenantID from Step 1 in the following URL. You’ll find it on the “Overview page in Azure Active Directory” (marked red in the following screenshot). Solution approach 1: Allow Apple Internet accounts tenant wide Step 1: Find out TenantIDįirst of all you have to find out the Tenant ID of the Azure AD Tenant. There are several possible solutions without simply unlocking all third-party apps. This setting should be kept to “No”! The fact that the end user is not allowed to allow any apps (and therefore can’t get ahead here) is exactly what you want to protect company data from unauthorized access. The option is called “Users can consent to apps accessing company data on their behalf”. in Azure AD under “Enterprise applications” -> “User settings”. This recommended setting can be set so that end users cannot simply authorise third-party apps to access company data.


However, the previous AppID has remained the same. Please ask an admin to grant permission to this app before you can use it.īy the way, the app used to be called “iOS Accounts” and was apparently renamed in early 2020. Need admin approval Apple Internet Accounts Apple Internet Accounts needs permission to access resources in your organization that only an admin can grant. When the first users logged into Office 365 with his iPhone to sync his Contacts and Calendar, he got this dialogue:
