Configure Microsoft Intune MDM Integration for Device Approval
Applies To: Accops Workspace Windows Client 7.2.0.1040 and above
Category: Integration & Device Management
Feature Status: Stable
Overview
This guide explains how to configure Microsoft Intune MDM integration for automatic device approval with HySecure Gateway. This feature enables device authentication based on real-time compliance status with Microsoft Intune server, allowing only enrolled and compliant devices to access corporate resources. Device approval occurs automatically during login based on device registration and compliance status with Microsoft Intune, eliminating manual device approval processes and ensuring consistent security policy enforcement.
Prerequisites
- Gateway Version: HySecure Gateway 7.1 SP1 and above
- Client Version: Windows (7.2.0.1040) or Mac (7.0.1.1101) Workspace Client
- Administrative Access: Security Officer or Administrator access to HySecure Management Console
- Microsoft Intune Access: Global Administrator or Intune Administrator privileges in Microsoft 365 tenant
- Azure AD Integration: Devices enrolled in Microsoft Entra (Azure AD) and Microsoft Intune
- Network Connectivity: HTTPS connectivity to Microsoft Graph API endpoints
- Knowledge Requirement: Understanding of Microsoft Intune device management, Azure AD device registration, and HySecure access control policies
Benefits
- Automated Compliance Enforcement: Device approval based on real-time Intune compliance status eliminates manual review processes
- Reduced Administrative Overhead: Automatic device registration and approval reduces IT support workload and improves operational efficiency
- Enhanced Security Posture: Only compliant, enrolled devices can access corporate resources, ensuring consistent security policy enforcement
- Enterprise Integration: Seamless integration with existing Microsoft 365 environments leverages current identity and device management investments
Microsoft Intune Integration Components
Device Compliance Validation
- Description: Real-time verification of device compliance status against Microsoft Intune policies
- Use Case: Ensure accessing devices meet organizational security standards before gateway access
- Requirements: Active Intune device enrollment and compliance policies configured
Entra Device ID Authentication
- Description: Device identification using Microsoft Entra Device IDs for unique device recognition
- Use Case: Accurate device identification across hybrid and cloud-joined scenarios
- Requirements: Devices registered with Microsoft Entra (Azure AD) directory
Automated Device Registration
- Description: Compliant devices automatically appear in HySecure management console without manual intervention
- Use Case: Streamlined device onboarding for large enterprise deployments
- Requirements: Proper API connectivity and authentication configuration
Platform Support
| Client Platform | Version Requirement | Intune Support Level | Gateway Compatibility |
|---|---|---|---|
| Windows Workspace Client | 7.2.0.1040+ | Full Support | HySecure 7.1 SP1+ |
| Mac Workspace Client | 7.0.1.1101+ | Full Support | HySecure 7.1 SP1+ |
| iOS/Android Clients | Any Version | Must Bypass | Not Supported |
| Linux Clients | Any Version | Must Bypass | Not Supported |
Procedure Part 1: Microsoft Intune Preparation
Step 1: Verify Intune Device Enrollment
- Access Microsoft Intune Admin Center
- Navigate to admin.microsoft.com and login with Global/Intune Administrator credentials
- Select Endpoint Manager or access endpoint.microsoft.com
-
Navigate to Devices → All devices to view enrolled devices
-
Verify Device Enrollment Status
- Confirm target devices show Enrolled status in Intune console
- Verify devices are Azure AD joined or Hybrid Azure AD joined
- Check device compliance status shows Compliant for devices requiring access
-
Document Entra Device IDs for devices requiring HySecure access
-
Configure Compliance Policies (If Not Already Configured)
- Navigate to Devices → Compliance policies
- Create or modify compliance policies for Windows and Mac platforms
- Define security requirements: encryption, antivirus, OS versions, etc.
- Assign policies to appropriate device groups or all users
Step 2: Configure Microsoft Graph API Permissions
- Register Application in Azure AD
- Navigate to Azure Portal → Azure Active Directory → App registrations
- Click New registration and create application for HySecure integration
- Configure application name: "HySecure-Intune-Integration"
-
Set redirect URI if required for authentication flow
-
Configure API Permissions
- Select registered application and navigate to API permissions
- Click Add a permission → Microsoft Graph → Application permissions
-
Add required permissions:
Device.Read.All- Read device informationDeviceManagementManagedDevices.Read.All- Read Intune managed devicesDirectory.Read.All- Read directory data for device identification
-
Grant Admin Consent
- Click Grant admin consent for [tenant] to approve permissions
- Verify all permissions show Status: Granted for [tenant]
- Note Application (client) ID and Directory (tenant) ID for HySecure configuration
Step 3: Generate Client Secret
- Create Client Secret
- In registered application, navigate to Certificates & secrets
- Click New client secret under Client secrets section
- Configure description: "HySecure Gateway Integration"
-
Set expiration: 24 months (recommended for production)
-
Secure Secret Value
- Critical: Copy secret Value immediately (not visible after navigation)
- Store secret securely in organizational password management system
- Document secret expiration date for renewal planning
- Configure monitoring for secret expiration notifications
Procedure Part 2: HySecure Gateway Configuration
Step 1: Configure External Authentication
- Access HySecure Management Console
- Login as Security Officer or Administrator
- Navigate to Settings → Services Config → External Authentication
-
Select General Configuration section
-
Configure MDM Integration Settings
- External Authentication Type: Select Device Approval
- Device Approval Mode: Select MDM as approval mode
- Select MDM Provider: Choose Microsoft Intune
- Endpoint URL: Enter
https://graph.microsoft.com -
Endpoint API Version: Select 1 (Microsoft Graph v1.0)
-
Configure Device Identification
- Search Attribute: Select Entra Device ID
- Read Timeout (Secs): Configure 30 seconds (recommended)
-
Connection Timeout (Secs): Configure 10 seconds (recommended)
-
Configure Authentication Credentials
- Authentication Type: Select Basic
- MDM Client ID: Enter Application (client) ID from Azure AD app registration
- Client Secret: Enter client secret value created in Azure AD
- Tenant ID: Enter Directory (tenant) ID from Azure AD
- Click Submit to save configuration
Step 2: Test MDM Connectivity
- Validate Configuration
- Use Test Connection feature if available in HySecure console
- Verify successful connectivity to Microsoft Graph API
- Confirm authentication credentials are accepted
-
Check logs for any connectivity or authentication errors
-
Verify Device Query Capability
- Test device lookup using known Entra Device ID
- Confirm compliance status retrieval from Intune
- Validate response time and data accuracy
- Document any connectivity issues for troubleshooting
Procedure Part 3: Device ID Access Control Configuration
Step 1: Create Device ID Access Control Policy
- Navigate to ACL Configuration
- Login to HySecure Management Console as Security Officer/Administrator
- Navigate to Policies → ACL
-
Click Add or Create New Policy for Device ID policy
-
Configure Basic Policy Settings
- Policy Name: Enter descriptive name (e.g., "Intune-Device-Approval-Policy")
- Policy Type: Select Device ID
- Device Parameter: Set to Device ID
-
Policy Description: Document policy purpose and scope
-
Enable External Authentication
- Check External Authentication checkbox
- Authentication Server: Select Microsoft Intune from dropdown
- This links the ACL policy to the configured MDM integration
Step 2: Configure Authentication Frequency
- Select Authentication Mode
- Check on every login: Authenticates device with MDM server at every login attempt
- Use Case: Maximum security for highly sensitive environments
- Impact: Additional latency for each login, higher API usage
-
Check for new device: Authenticates only new devices with MDM server
- Use Case: Balanced security and performance for most environments
- Impact: Reduced API calls, faster subsequent logins
-
Configure Policy Priority
- Set policy priority if multiple Device ID policies exist
- Higher priority policies evaluated first during authentication
-
Document policy interaction and evaluation order
-
Save and Activate Policy
- Click Submit to save Device ID ACL policy
- Verify policy appears in ACL policy list
- Test policy activation with sample device
Step 3: Assign Policy to Users/Groups
- User-Level Assignment
- Navigate to Users → [Username] → Policies
- Add created Device ID ACL policy to user's policy assignments
-
Set policy priority and effective dates if applicable
-
Group-Level Assignment (Recommended for Scale)
- Navigate to Groups → [Group Name] → Policies
- Assign Device ID ACL policy to appropriate user groups
- Verify policy inheritance for all group members
- Document group assignments for audit purposes
Configuration Examples
Example 1: Standard Enterprise Deployment
Configuration:
- Authentication Mode: Check for new device (balanced approach)
- Policy Assignment: Applied to "Remote Workers" group
- Compliance Requirements: Basic security policies (encryption, antivirus, OS updates)
- Timeout Settings: Read: 30s, Connection: 10s
- API Permissions: Standard device read permissions
Use Case: Medium to large enterprises with standard security requirements and regular remote access needs
Benefits: Automated device approval with reasonable performance and comprehensive coverage
Example 2: High-Security Environment
Configuration:
- Authentication Mode: Check on every login (maximum security)
- Policy Assignment: Applied to "Executive" and "Finance" groups
- Compliance Requirements: Strict security policies (full disk encryption, advanced threat protection, real-time monitoring)
- Timeout Settings: Read: 15s, Connection: 5s (faster for frequent checks)
- API Permissions: Enhanced permissions for detailed device information
Use Case: Financial services, healthcare, or government organizations with strict security requirements
Benefits: Real-time compliance validation with maximum security assurance
Example 3: Hybrid Workforce Model
Configuration:
- Authentication Mode: Check for new device with periodic re-validation
- Policy Assignment: Applied based on user role and location
- Compliance Requirements: Role-specific policies (contractors vs. employees)
- Timeout Settings: Adaptive based on network conditions
- API Permissions: Comprehensive permissions for detailed device lifecycle management
Use Case: Organizations with mixed employee types, contractors, and varying access requirements
Benefits: Flexible policy application with role-based device compliance requirements
Device Enrollment and Login Process
First-Time Device Login
Enrollment Workflow:
- Device Compliance Check: User attempts login from Intune-enrolled device
- Intune Validation: HySecure queries Microsoft Intune for device compliance status
- Compliance Verification: System verifies device enrollment and compliance policy adherence
- Automatic Approval: Compliant devices automatically approved and added to HySecure device list
- Access Granted: User receives gateway access confirmation
Non-Compliant Device Handling:
- Compliance Failure: Non-enrolled or non-compliant device login attempt fails
- Manual Review Queue: Device appears in HySecure Devices section for admin review
- Admin Notification: Administrators notified of non-compliant device access attempt
- Resolution Required: Device must achieve compliance before access approval
Subsequent Logins
Streamlined Authentication:
- New Device Mode: Compliant devices authenticate quickly using cached status
- Every Login Mode: Real-time compliance verification for each access attempt
- Performance Optimization: Cached compliance status reduces API calls and improves response time
Verification and Testing
Integration Testing
- Compliant Device Test
- Use known compliant, Intune-enrolled device for login test
- Verify successful authentication and automatic device approval
- Check device appears in HySecure Devices section with correct compliance status
-
Expected Result: Seamless login with automatic device registration
-
Non-Compliant Device Test
- Use device that doesn't meet Intune compliance policies
- Attempt login and verify access denial
- Confirm device appears in manual approval queue
-
Expected Result: Access denied with compliance-related error message
-
Unenrolled Device Test
- Use device not enrolled in Microsoft Intune
- Attempt login and verify system behavior
- Check error messages and admin notifications
- Expected Result: Access denied with enrollment requirement notification
API Connectivity Testing
- Microsoft Graph API Validation
- Test API connectivity using configured credentials
- Verify successful device information retrieval
- Monitor API response times and error rates
-
Expected Result: Consistent API connectivity with acceptable response times
-
Authentication Token Management
- Verify OAuth token acquisition and renewal
- Test token expiration handling and refresh
- Monitor authentication failure rates
- Expected Result: Stable authentication with automatic token management
Monitoring and Logging
MDM Integration Event Logging:
- Successful device approvals: Device ID, compliance status, timestamp, user
- Failed compliance checks: Device ID, failure reason, compliance issues, timestamp
- API connectivity issues: Error codes, timeout events, retry attempts
- Policy application events: User assignments, policy changes, effectiveness
Log Analysis Procedures:
- Navigate to HySecure Management Console → Monitoring → External Authentication Logs
- Filter by Authentication Type: MDM for Intune-specific events
- Analyze device approval success rates and compliance failure patterns
- Review API performance metrics and connectivity stability
Performance Monitoring:
- API response time tracking for Microsoft Graph queries
- Device compliance check success rates
- User authentication experience metrics
- Administrative workload reduction measurements
Security Considerations
API Security
Authentication Security:
- Client Secret Protection: Store secrets in secure credential management systems
- Token Management: Implement secure OAuth token handling and refresh procedures
- API Permissions: Apply principle of least privilege for Microsoft Graph permissions
- Network Security: Use TLS 1.2+ for all API communications
Access Control:
- Service Account Security: Dedicated service accounts for API integration
- Permission Auditing: Regular review of API permissions and access grants
- Credential Rotation: Scheduled client secret rotation and renewal procedures
- Activity Monitoring: Comprehensive logging of API usage and authentication events
Device Trust Model
Compliance Validation:
- Real-Time Verification: Current compliance status validation for critical access decisions
- Policy Consistency: Alignment between Intune compliance policies and organizational security requirements
- Device Lifecycle: Handling of device enrollment, compliance changes, and decommissioning
- Trust Boundaries: Clear definition of trusted device criteria and compliance standards
Risk Management:
- Compliance Drift Detection: Monitoring for devices falling out of compliance
- Policy Violation Response: Automated actions for non-compliant device access attempts
- Incident Response: Procedures for handling compromised or suspicious devices
- Audit Capabilities: Comprehensive device access and compliance audit trails
Troubleshooting
Common Issues:
API Authentication Failures:
- Issue: HySecure cannot authenticate with Microsoft Graph API
- Check: Verify client ID, secret, and tenant ID are correctly configured in HySecure
- Verify: Confirm Azure AD app registration has required API permissions with admin consent
- Solution: Regenerate client secret and update HySecure configuration; verify API permissions
- Prevention: Implement client secret expiration monitoring and automated renewal procedures
Device Compliance Check Failures:
- Issue: Compliant devices showing as non-compliant or failing authentication
- Check: Verify device enrollment status and compliance policy assignment in Intune
- Verify: Confirm Entra Device ID matches between Intune and HySecure device records
- Solution: Re-enroll device in Intune or update compliance policies; sync device records
- Prevention: Regular compliance policy review and device enrollment status monitoring
Performance Issues with API Calls:
- Issue: Slow login times or timeouts during device compliance verification
- Check: Review API timeout settings and network connectivity to Microsoft Graph endpoints
- Verify: Monitor Microsoft Graph API service status and rate limiting
- Solution: Adjust timeout values and implement retry logic; consider caching strategies
- Prevention: Establish API performance baselines and monitoring alerts
Device ID Mismatch Issues:
- Issue: Devices not recognized due to Entra Device ID discrepancies
- Check: Compare device IDs between Intune console and HySecure device records
- Verify: Confirm device registration method (Azure AD join vs. hybrid join)
- Solution: Re-register device with Azure AD or update device ID mapping
- Prevention: Standardize device registration procedures and ID management
Diagnostic Steps
API Connectivity Diagnostics:
# Test Microsoft Graph API connectivity
$headers = @{
'Authorization' = "Bearer $accessToken"
'Content-Type' = 'application/json'
}
# Test device query
$deviceId = "your-device-id"
$uri = "https://graph.microsoft.com/v1.0/devices/$deviceId"
Invoke-RestMethod -Uri $uri -Headers $headers -Method GET
Intune Device Verification:
- Device Enrollment Status: Verify in Intune admin center
- Compliance Policy Assignment: Check policy application and evaluation
- Device Registration: Confirm Azure AD device registration
- API Permissions: Validate application permissions and consent
HySecure Configuration Validation:
- Review external authentication configuration settings
- Verify Device ID ACL policy creation and assignment
- Check user/group policy assignments
- Monitor authentication logs for error patterns
Advanced Configuration
API Integration Optimization
Performance Tuning:
- Connection Pooling: Optimize HTTP connections to Microsoft Graph API
- Response Caching: Cache device compliance status for improved performance
- Batch Operations: Group device queries for efficiency when possible
- Retry Logic: Implement intelligent retry mechanisms for transient failures
Scalability Considerations:
- Rate Limiting: Respect Microsoft Graph API throttling limits
- Load Distribution: Distribute API calls across time periods for large user bases
- Regional Deployment: Consider regional API endpoints for global deployments
- Monitoring Integration: Implement comprehensive API usage monitoring
Enterprise Integration
Identity Management Integration:
- Automated User Provisioning: Link with HR systems for automatic policy assignment
- Group-Based Policy Management: Dynamic policy assignment based on organizational units
- Conditional Access Integration: Coordinate with Azure AD conditional access policies
- Lifecycle Management: Automated device and user lifecycle management
Compliance Automation:
- Policy Template Management: Standardized compliance policy templates
- Automated Remediation: Integration with device management tools for compliance correction
- Reporting and Analytics: Comprehensive compliance reporting and trend analysis
- Risk Assessment: Integration with security risk assessment and response systems
Multi-Tenant Scenarios
Service Provider Deployments:
- Tenant Isolation: Separate MDM configurations for different customer tenants
- Cross-Tenant Authentication: Handling devices across multiple Azure AD tenants
- Policy Inheritance: Tenant-specific policy templates and customizations
- Administrative Boundaries: Clear separation of administrative access and responsibilities
Notes
- Platform Limitations: Currently supported only for Windows (7.2.0.1040+) and Mac (7.0.1.1101+) Workspace clients - other platforms must be bypassed
- Client Secret Management: Client secrets expire and require periodic renewal - implement monitoring and rotation procedures
- API Dependencies: Feature functionality depends on Microsoft Graph API availability and proper Azure AD configuration
- Compliance Policy Alignment: Ensure Intune compliance policies align with organizational security requirements and HySecure access standards