Configure macOS Platform SSO by deploying an SSO extensions configuration profile
through your MDM to authorize agent access.
| Where Can I Use This? | What Do I Need? |
macOS Platform SSO enables Prisma Access Agent to automatically authenticate users
using their existing macOS device credentials, eliminating separate authentication
prompts while maintaining always-on security protection. This integration leverages
the macOS Single Sign-On Extension framework to provide seamless connectivity
between device login and network access.
When a user logs into their macOS device using supported credentials, the SSO
extension validates these credentials with your identity provider and creates an SSO
token. Prisma Access Agent requests this token from the SSO extension rather than
prompting for separate credentials, establishing the secure connection automatically
without user interaction or browser prompts.
If Platform SSO becomes unavailable due to token expiration, SSO extension
misconfiguration, or connectivity issues, Prisma Access Agent falls back to SAML
authentication. The system notifies the user of the authentication issue and prompts
for manual credential entry to maintain connectivity.
Required Components
To deploy macOS Platform SSO with Prisma Access Agent, you need several components
working together:
Limitation with Traffic Forwarding and macOS Platform SSO
When macOS Platform SSO is enabled and the agent requires token refresh while traffic
enforcement policies are active, authentication traffic from the SSO application
becomes subject to existing traffic steering restrictions. You must
configure a forwarding rule to allow all
network addresses required by your identity provider's SSO application, including
any potential redirection endpoints, to ensure successful authentication flow
completion, obtain a refreshed token from the IdP, and subsequently establish the
agent connection using that token. While your MDM configuration provides most
required addresses, additional redirections during authentication may occur that
cannot be automatically identified. You are responsible for identifying and allowing
all SSO-related network connections in your forwarding profile configuration to
prevent authentication failures.
The following procedure shows how to configure a Platform SSO configuration profile
for Prisma Access Agent. It has been qualified for Jamf Pro using the Intune Company
Portal extension with Entra ID as the IdP: