![Microsoft outlook for mac os x Microsoft outlook for mac os x](/uploads/1/2/5/5/125520924/703428641.png)
Nov 12, 2014 In October we updated OneNote for Mac and iOS, Word, Excel, and PowerPoint for iOS and for activations in Outlook for Mac. For iOS and OS X clients to function correctly with AD FS 2.0 it is important your AD FS 2.0 server be at the latest patch. Get an overview of the supported settings in an Azure Active Directory conditional access. MFA and location policy for apps. Mac OS X: Outlook 2016, Outlook.
I have solved the main part of this. To get SSO and No MFA on Intranet I had to select an additional condition. Conditions/Locations/Exclude check 'All Trusted IPs' This refers to the old MFA settings with possibilities to add trusted IPs. Here we have checked: 'Skip Multi-factor authentication for requests from federated users on my intranet' This means that all intranet is included as a trusted IP.
Now we have SSO or No MFA on webapps the Intranet again. But we should have had SSO for webapps on domain joined computers without this setting, as we did for Native apps. So something is still fishy! Hi, Thank you for reaching out to us on Azure forums! You can Enable SSO (Single Sign On) to On-Premises Exchange OWA (Outlook Web Access) via Azure AD Application Proxy.
Check this link for details - Not sure, in your scenario SSO for Outlook webapp is supported. See this link - for the list of apps that supports conditional access rules in Azure AD. Hope that helps!
![O365 O365](https://help.unc.edu/files/2016/03/2-O365-MacMail-Exchange.png)
Best Regards Sadiqh Ahmed If this post was helpful to you, please up vote it and/or mark it as an answer so others can more easily find it in the future. Hi, Back again after vacation.
Still same problem. We lose SSO on domain joined computers for 365 portal apps on the intranet when a user is assigned the new Azure conditional access policys. We also get MFA on non domain joined computers on the intranet. The reason why we want no MFA on Intranet is: RDS servers that cannot be AAD joined. MAC on the Intranet cannot be AAD joined. I have solved the main part of this. To get SSO and No MFA on Intranet I had to select an additional condition.
Conditions/Locations/Exclude check 'All Trusted IPs' This refers to the old MFA settings with possibilities to add trusted IPs. Here we have checked: 'Skip Multi-factor authentication for requests from federated users on my intranet' This means that all intranet is included as a trusted IP. Now we have SSO or No MFA on webapps the Intranet again. But we should have had SSO for webapps on domain joined computers without this setting, as we did for Native apps. So something is still fishy!