
- #IDENTITY API SCOPE APPROVAL UI MAC HOW TO#
- #IDENTITY API SCOPE APPROVAL UI MAC FULL#
- #IDENTITY API SCOPE APPROVAL UI MAC FOR WINDOWS 10#
- #IDENTITY API SCOPE APPROVAL UI MAC PASSWORD#
#IDENTITY API SCOPE APPROVAL UI MAC FOR WINDOWS 10#
This one works for Windows 10 Pro, Business, Enterprise, and Education editions version 1709 and later. We can see which Windows editions and Windows 10 versions the CSP is supported for.
#IDENTITY API SCOPE APPROVAL UI MAC PASSWORD#
The documentation shows us all the information we need to define the OMA-URI path for AAD password reset: See Authentication/AllowAadPasswordReset? That’s the AreaName/PolicyName combination we’ll use to configure self-service password reset from the Windows 10 login screen.

Something like the Authentication Section. How do we find the AreaName/PolicyName information? Easy, just scroll down the Policy CSP documentation page until you see something that might relate to SSPR. We already know it’s going to start like this: Why not let them reset their own passwords while you focus on something more strategic with all that $$$ you’re going to save by enabling SSPR and reducing the number of help desk calls? Let’s build out the OMA-URI path together for this one. Something like 30% of help desk calls involve helping users reset their passwords.

This is a pretty common custom policy that I see implemented a lot. So that’d be the OMA-URI path to enable you to configure some Windows 10 setting with Intune.Īn example might help. Vendor/MSFT/Policy/Config/ AreaName/PolicyName
#IDENTITY API SCOPE APPROVAL UI MAC FULL#
The final, full OMA-URI path looks something like this: To find the AreaName/PolicyName combination, just skim through the list of available policies at the bottom of your favorite CSP documentation page to see which section matches your custom policy requirements. The AreaName/PolicyName specifies the name/value pair used in the policy. We’ll need more than just the AreaName to finish building our OMA-URI path-we also need the PolicyName. Vendor/MSFT/Policy/Config/ AreaName Policy name information So, now the OMA-URI path looks like the following Where AreaName is something we still need to define: We’re only ever going to care about the Policy/ Config/ AreaName. The Policy CSP has two sub-categories: Policy/Config/AreaName and Policy/Result/AreaName. Watch those p’s and Q’s as you’re building out the path. That will be the root node for all custom policies used with Intune.Īt this point, our new OMA-URI path now looks like this: The root node of the Policy CSP is always called /Vendor/MSFT/Policy. You can skip using a scope for device-wide settings, and the majority of Intune custom policies will target the device scope, but I like to use it just to be safe. which means our OMA-URI path has a beginning:
#IDENTITY API SCOPE APPROVAL UI MAC HOW TO#
We’ll come back to how to find this in an example, and it’s easy to figure out, but for now, just remember, the scope is the first part of the OMA-URI path. There are two scope available for applying CSP settings: User and Device. When building out the OMA-URI path to configure a setting in Windows 10, you’ll need to get these bits of information from the CSP documentation. The bottom line is that we need to build an OMA-URI path that points to a setting we want to configure, and that doc has the few bits of information needed to do so. There’s a lot on that page that you need to know, but there’s also a lot that you don’t need to pay attention to. That’s where the Policy CSP documentation comes in handy. Intune likes to use the Policy CSP to configure Windows 10 settings so all you have to figure out is which one you want to use and where it lives. Another analogy that works for me is to think of OMA-URI locations as registry key paths containing properties that you want to set via policy. If you’re familiar with Group Policy Objects (GPOs), then you can think of CSPs as kind of like small, pseudo-GPO’s in that they contain settings that you configure centrally via an MDM solution like Intune. That all sounds quite confusing at first glance I know. The OMA-URI settings can be scoped to either users or devices and some only apply to specific versions of Windows 10. Windows 10 custom profiles use Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings to configure different features. That’s how Intune pushes CSP-based policies to managed devices it’s using Synchronous Markup Language (Sync ML) and OMA device management (OMA DM). Here’s the important part for Intune admins, “ SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM)”.

provxml file that is installed during boot SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a. Some configuration service providers support the WAP format, some support SyncML, and some support both. These settings map to registry keys or files.

Here’s the official definition:Ī configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. In Microsoft Intune, Configuration Service Providers (CSP’s) are used to configure settings on Windows PCs.
