With Swif’s Platform SSO Policy you can replace the standard macOS login window with an Azure AD / Entra ID Single-Sign-On flow. Users authenticate with their Microsoft credentials (with MFA), and Swif provisions—or unlocks—the matching local account before macOS finishes booting.
1 Prerequisites
Requirement | Details |
macOS 11 or later | Swif Agent v1.235.0 + installed. |
Entra ID (Azure AD) tenant | Global Admin rights to create an App Registration. |
Swif Org Admin | Permission to create and deploy policies. |
2 Create an Azure AD App Registration
Sign in to the Azure Portal → Microsoft Entra ID → App registrations → New registration.
Name:
Swif macOS Login
.Supported account types: Single tenant (or Multi-tenant if required).
Redirect URI → Web →
https://127.0.0.1/xcreds
.Click Register.
After the app is created, copy the Application (client) ID (GUID).
Under API permissions, ensure openid, profile, email, and offline_access (for refresh tokens) are present (delegated).
Certificates & Secrets → Not required for a public-loopback client, so you may omit a client secret.
3 Configure the Platform SSO Policy in Swif
In Swif Admin:
Policies → Create New Policy → Platform SSO Policy.
Populate the fields as follows:
Field | Value | Notes |
Client ID |
| Your Azure AD Client ID. |
Discovery URL |
| Entra OIDC metadata. |
Redirect URI |
| Must match the URI in Azure. |
Scopes |
| Grants ID + refresh token. |
Create Admin User |
| Creates the local user as admin if absent. |
Map First Name / Map Last Name |
| JWT → macOS fields. |
Map Username / Map Full Username |
| Uses UPN or email as short name. |
Tip: If you add a Client secret, place it in Client Secret
; otherwise, leave blank for a public client.
Save the policy.
4 Assign the Policy to Macs
Select the Mac devices or a Smart Group (e.g. All macOS).
Click Deploy.
Swif sends a configuration profile that replaces the native login window.
5 End-User Login Flow
At power-on, the user sees Sign in with Microsoft.
A secure browser (Edge WebView) opens to
login.microsoftonline.com
; the user enters credentials and completes MFA.Swif’s login agent:
Validates the ID token.
Creates or unlocks the mapped local account.
Logs the user in—no local password is stored.
6 Troubleshooting
Issue | Fix |
Blank login window | Confirm the profile is installed (System Settings → Privacy & Security → Profiles) and reboot. |
“Redirect URI mismatch” | Ensure |
Offline login fails | Azure AD requires online auth; a refresh token allows subsequent logins if the network is momentarily down, but the first login must be online. |
Account mapping incorrect | Adjust |
Error setting local password to cloud password | There is a conflict with your password policy. You can change the cloud password or remove the password policy from the device. |
7 Security Best Practices
MFA: Enforce Azure AD multi-factor authentication for maximum protection.
Client secrets: If you create a confidential client, rotate secrets annually.
Admin vs. Standard user: Set
createAdminUser = false
for least-privilege deployments.Pilot first: Test with a small Mac cohort before enabling org-wide.
Deploying an Platform SSO Policy with Azure AD ensures every macOS sign-in is governed by your corporate IdP—centralizing account lifecycle and strengthening endpoint security. For assistance, contact support@swif.ai.