Workspace ONE UEM integration with Microsoft allows customers to use Workspace ONE UEM device data such as device compliance state in the Azure AD conditional access policies. The integration gives you the ability to set different conditional access policies for individual Office 365 applications. Platform support for this feature is limited to iOS, Android, and Windows 10 OOBE enrolled devices.
You can restrict access to individual Office 365 applications if the device is unmanaged and not compliant. For instance, you can opt to allow users to access Microsoft Word on any device while restricting access to OneDrive to only managed and compliant devices.
- Navigate to Opt-in box, and complete the process. For more information, see VMware Workspace ONE Intelligence documentation. You do not need the VMware Workspace ONE Intelligence license to enable the integration. , check the
- This feature is also supported for on-premise Workspace ONE UEM environment, however ETL connector is required to be installed and connected to the nearest Intelligence data center. For more information, see Workspace ONE Intelligence requirement.
Note: It is important that you create a publicly resolvable URL for the UEM console and open the network for VMware Workspace ONE Intelligence to reach the publicly available console URL over port 443.
- Workspace ONE Intelligent Hub 20.3 and above.
- For all your iOS and Android legacy devices make sure you install and register Microsoft Authenticator.
- For all Android enterprise devices, Microsoft Authenticator and all the applications used for conditional access must be pushed as a managed app.
- You require a valid subscription to Microsoft Intune, and the Microsoft Intune licenses must be assigned to the users supported by this integration. For more information, see the Microsoft subscription.
You cannot disable or re-enable the integration under the following circumstances:
- If you remove VMware Workspace ONE mobile compliance partner from the partner compliance management in the Azure Active Directory.
- If you remove Workspace ONE Conditional Access app in the enterprise applications from Azure Active Directory.
If you want to disable the integration, complete the following:
- Disable conditional access settings in Workspace ONE UEM console.
- Look up for the security group and manually remove the existing device records in the Azure Active Directory.
- Navigate to to sync the latest information from the Azure portal.
- Log into the Azure portal as an admin. Add VMware Workspace ONE mobile compliance as a device partner for the Android and iOS device type. For more information, see support third-party device compliance partners in the Microsoft Intune documentation.
- In the Workspace ONE UEM console, navigate to .
- Enter Azure Directory ID in the Directory ID text box. The Azure Directory ID is found in your Azure AD Directory Instance URL. For example, if your URL is acme.com/WS/ADExt/Dir/0a12bc34-56d7-93f1-g2h3-i4-jk56lm78n, only the last section 0a12bc34-56d7-93f1-g2h3-i4-jk56lm78n is your Directory ID.
Note: Currently, we only support mapping one Azure tenant to one Workspace ONE UEM Customer OG.
- Enable Use Azure AD for Compliance.
Note: This setting is visible only for a customer OG. Child OGs inherits this setting but is not visible in the user interface.A pop-up menu appears that redirects you to Microsoft for authenticating the Azure AD.
- Click Proceed.
You are directed to a Microsoft webpage to authenticate and approve your permit.
- Accept the permissions.
Once you accept the permissions, the Workspace ONE conditional access app is added to your Azure portal. For the Windows OOBE device type, admin must manually add the AirWatch By VMware application.
- Navigate to the Workspace ONE UEM console and complete the integration.
UEM performs a validation. If the permissions have been accepted. A pop-up box appears. If you do not accept the permissions in step 6, the complete integration step is greyed out.
If you have accepted the permissions in step 6, the complete integration step will be active and upon completing the step, a success message is displayed.A success message is displayed after the integration is complete. Once you have successfully completed the integration, navigate to Azure AD to configure conditional access policies. Under Enable Policy select On to enable the desired policy. For more information, see Create a device-based Conditional Access policy.Note: Users are blocked, and redirected to register their Workspace ONE enrolled devices with Intune and AAD only when they attempt to run an application with a AAD conditional access policy applied to it. Configuring Azure AD conditional access policies as Report Only does not direct users through registration.
- If any changes are made to the Device partner compliance page in Intune, then the Sync button syncs the information.
- If you want to manually send the compliance state of the device and management state of the device to Azure, of then they can Resync the data by clicking Re-sync.
Note: Once the resync is done, it is grayed for next four hours.
- Once you have successfully completed the migration, navigate to Azure AD to configure conditional access policies. Under Enable Policy, select On to enable the desired policy. For more information, see Create a device-based Conditional Access policy.