While Gmail is among the most popular web email clients, many people prefer to manage their email from their desktop on a desktop email client of their choice. Especially for people managing multiple accounts the advantages of using a desktop client seems obvious. Best desktop client for gmail on mac. I’m still lamenting the death of Sparrow Sparrow - A New Gmail Desktop Client for Mac Users Sparrow - A New Gmail Desktop Client for Mac Users Read More, a fantastic mail app that was acquired by Google and thrown into the recycle bin.I’m not over it yet. Since Sparrow’s untimely demise, I’ve tried a number of alternatives to find the best way to use Gmail on a Mac. Apr 05, 2015 Download Go for Gmail - Email Client for macOS 10.9 or later and enjoy it on your Mac. Go for Gmail is the best and most powerful Gmail desktop client. It's perfect for quickly accessing your Gmail account without ever needing to open a web browser.
The Campus Active Directory Service prohibits Remote Desktop Connections to its domain controllers. Organizational Unit management is performed by using Microsoft's Server Administration Tools on a machine joined to the campus active directory domain. There is a method of offering partial Mac client management and access to other Mac OS X Server services under Active Directory that doesnt require schema modification. The approach is twofold. Blog Home > Dynamic Analysis > OS X Active Directory Integration – How to Bind a Mac to AD. Most IT professionals are efficient with the Mac OS X or Windows Active Directory (AD) but not both. The PortalGuard Desktop Client can be installed and your end users will be able to enjoy the same Self-service Password Reset and Recovery.
-->You can use Azure Active Directory (Azure AD) Conditional Access to control how authorized users can access your resources.
This article provides you with support information for the following configuration options in a Conditional Access policy:
- Cloud applications assignments
- Device platform condition
- Client applications condition
- Approved client application requirement
If this is not the information you are looking for, please leave a comment at the end of this article.
Cloud apps assignments
With Conditional Access policies, you control how your users access your cloud apps. When you configure a Conditional Access policy, you need to select at least one cloud app.
Microsoft cloud applications
You can assign a Conditional Access policy to the following cloud apps from Microsoft:
- Azure Analysis Services
- Azure DevOps
- Azure SQL Database and Data Warehouse - Learn more
- Dynamics CRM Online
- Microsoft Application Insights Analytics
- Microsoft Azure Information Protection - Learn more
- Microsoft Azure Management - Learn more
- Microsoft Azure Subscription Management
- Microsoft Cloud App Security
- Microsoft Commerce Tools Access Control Portal
- Microsoft Commerce Tools Authentication Service
- Microsoft Flow
- Microsoft Forms
- Microsoft Intune
- Microsoft Intune Enrollment
- Microsoft Planner
- Microsoft PowerApps
- Microsoft Search in Bing
- Microsoft StaffHub
- Microsoft Stream
- Microsoft Teams
- Office 365 Exchange Online
- Office 365 SharePoint Online
- Office 365 Yammer
- Office Delve
- Office Sway
- Outlook Groups
- Power BI Service
- Project Online
- Skype for Business Online
- Virtual Private Network (VPN)
- Visual Studio App Center
- Windows Defender ATP
Other applications
In addition to the Microsoft cloud apps, you can assign a Conditional Access policy to the following types of cloud apps:
- Azure AD-connected applications
- Pre-integrated federated software as a service (SaaS) application
- Applications that use password single sign-on (SSO)
- Line-of-business applications
- Applications that use Azure AD Application Proxy
Device platform condition
In a Conditional Access policy, you can configure the device platform condition to tie the policy to the operating system on a client. Azure AD Conditional Access supports the following device platforms:
- Android
- iOS
- Windows Phone
- Windows
- macOS
If you block legacy authentication using the Other clients condition, you can also set the device platform condition.
Client apps condition
In your Conditional Access policy, you can configure the client apps condition to tie the policy to the client app that has initiated an access attempt. Set the client apps condition to grant or block access when an access attempt is made from the following types of client apps:
- Browser
- Mobile apps and desktop apps
Supported browsers
In your Conditional Access policy, you can select Browsers as client app.
This setting works with all browsers. However, to satisfy a device policy, like a compliant device requirement, the following operating systems and browsers are supported:
OS | Browsers |
---|---|
Windows 10 | Microsoft Edge, Internet Explorer, Chrome |
Windows 8 / 8.1 | Internet Explorer, Chrome |
Windows 7 | Internet Explorer, Chrome |
iOS | Microsoft Edge, Intune Managed Browser, Safari |
Android | Microsoft Edge, Intune Managed Browser, Chrome |
Windows Phone | Microsoft Edge, Internet Explorer |
Windows Server 2019 | Microsoft Edge, Internet Explorer, Chrome |
Windows Server 2016 | Microsoft Edge, Internet Explorer |
Windows Server 2012 R2 | Internet Explorer |
Windows Server 2008 R2 | Internet Explorer |
macOS | Chrome, Safari |
Why do I see a certificate prompt in the browser
On Windows 7, iOS, Android, and macOS Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The user must select this certificate before using the browser.
Chrome support
For Chrome support in Windows 10 Creators Update (version 1703) or later, install the Windows 10 Accounts extension. This extension is required when a Conditional Access policy requires device specific details.
To automatically deploy this extension to Chrome browsers, create the following registry key:
Path | HKEY_LOCAL_MACHINESoftwarePoliciesGoogleChromeExtensionInstallForcelist |
Name | 1 |
Type | REG_SZ (String) |
Data | ppnbnpeolgkicgegkbkbjmhlideopiji;https://clients2.google.com/service/update2/crx |
For Chrome support in Windows 8.1 and 7, create the following registry key:
![Mac join active directory Mac join active directory](/uploads/1/3/3/8/133881348/830142009.png)
Path | HKEY_LOCAL_MACHINESOFTWAREPoliciesGoogleChromeAutoSelectCertificateForUrls |
Name | 1 |
Type | REG_SZ (String) |
Data | {'pattern':'https://device.login.microsoftonline.com','filter':{'ISSUER':{'CN':'MS-Organization-Access'}}} |
Active Directory For Mac
These browsers support device authentication, allowing the device to be identified and validated against a policy. The device check fails if the browser is running in private mode.
Supported mobile applications and desktop clients
In your Conditional Access policy, you can select Mobile apps and desktop clients as client app.
Rest client postmman for mac. Choose the relevant format type from the Value drop-down list. Request Parameters In this pane, specify the parameters to be passed to the target method through a query string inside the URL.
This setting has an impact on access attempts made from the following mobile apps and desktop clients:
Client apps | Target Service | Platform |
---|---|---|
Dynamics CRM app | Dynamics CRM | Windows 10, Windows 8.1, iOS, and Android |
Mail/Calendar/People app, Outlook 2016, Outlook 2013 (with modern authentication) | Office 365 Exchange Online | Windows 10 |
MFA and location policy for apps. Device based policies are not supported. | Any My Apps app service | Android and iOS |
Microsoft Teams Services - this controls all services that support Microsoft Teams and all its Client Apps - Windows Desktop, iOS, Android, WP, and web client | Microsoft Teams | Windows 10, Windows 8.1, Windows 7, iOS, Android and macOS |
Office 2016 apps, Office 2013 (with modern authentication), OneDrive sync client (see notes) | Office 365 SharePoint Online | Windows 8.1, Windows 7 |
Office 2016 apps, Universal Office apps, Office 2013 (with modern authentication), OneDrive sync client (see notes), Office Groups support is planned for the future, SharePoint app support is planned for the future | Office 365 SharePoint Online | Windows 10 |
Office 2016 (Word, Excel, PowerPoint, OneNote only). OneDrive for Business support planned for the future | Office 365 SharePoint Online | macOS |
Office 2019 | Office 365 SharePoint Online | Windows 10, macOS |
Office mobile apps | Office 365 SharePoint Online | Android, iOS |
Office Yammer app | Office 365 Yammer | Windows 10, iOS, Android |
Outlook 2019 | Office 365 SharePoint Online | Windows 10, macOS |
Outlook 2016 (Office for macOS) | Office 365 Exchange Online | macOS |
Outlook 2016, Outlook 2013 (with modern authentication), Skype for Business (with modern authentication) | Office 365 Exchange Online | Windows 8.1, Windows 7 |
Outlook mobile app | Office 365 Exchange Online | Android, iOS |
Power BI app | Power BI service | Windows 10, Windows 8.1, Windows 7, Android, and iOS |
Skype for Business | Office 365 Exchange Online | Android, IOS |
Visual Studio Team Services app | Visual Studio Team Services | Windows 10, Windows 8.1, Windows 7, iOS, and Android |
Torrent Client For Mac
Support for legacy authentication
By selecting Other clients, you can specify a condition that affects apps that use basic authentication with mail protocols like IMAP, MAPI, POP, SMTP, and older Office apps that don't use modern authentication.
For more information, see Client apps.
Approved client app requirement
In your Conditional Access policy, you can require that an access attempt to the selected cloud apps needs to be made from an approved client app.
This setting applies to the following client apps:
- Microsoft Azure Information Protection
- Microsoft Bookings
- Microsoft Cortana
- Microsoft Dynamics 365
- Microsoft Edge
- Microsoft Excel
- Microsoft Flow
- Microsoft Intune Managed Browser
- Microsoft Invoicing
- Microsoft Kaizala
- Microsoft Launcher
- Microsoft OneDrive
- Microsoft OneNote
- Microsoft Outlook
- Microsoft Planner
- Microsoft PowerApps
- Microsoft Power BI
- Microsoft PowerPoint
- Microsoft SharePoint
- Microsoft Skype for Business
- Microsoft StaffHub
- Microsoft Stream
- Microsoft Teams
- Microsoft To-Do
- Microsoft Visio
- Microsoft Word
- Microsoft Yammer
Remarks
- The approved client apps support the Intune mobile application management feature.
- The Require approved client app requirement:
- Only supports the iOS and Android for device platform condition.
App protection policy requirement
In your Conditional Access policy, you can require an app protection policy be present on the client app before access is available to the selected cloud apps.
This setting applies to the following client apps:
- Microsoft Cortana
- Microsoft Edge
- Microsoft OneDrive
- Microsoft Outlook
- Microsoft Planner
Remarks
- Apps for app protection policy support the Intune mobile application management feature with policy protection.
- The Require app protection policy requirements:
- Only supports the iOS and Android for device platform condition.
Next steps
Mac Join Active Directory
- For an overview of Conditional Access, see What is Conditional Access in Azure Active Directory?
- If you are ready to configure Conditional Access policies in your environment, see the recommended practices for Conditional Access in Azure Active Directory.