<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with SAML SSO based Password less BYOD flow for Apple device in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4975690#M585650</link>
    <description>&lt;P&gt;Just waiting to see if anyone has any suggestions.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Dec 2023 17:33:49 GMT</pubDate>
    <dc:creator>kshah2589</dc:creator>
    <dc:date>2023-12-11T17:33:49Z</dc:date>
    <item>
      <title>Issue with SAML SSO based Password less BYOD flow for Apple devices</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4971280#M585520</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;The SAML SSO based Password less flow(from Meraki &amp;gt;&amp;gt; Cisco ISE &amp;gt;&amp;gt; Microsoft Azure )&amp;nbsp; with windows and Android devices working properly. We are having challenges with Apple devices. when we connect Apple devices to SSID, the apple CNA(mini browser) pop up automatically and get redirected to Microsoft login page where we are putting username and then getting 2-digit code in authenticator app to confirm. After that, looks like the flow breaks and as a result we couldn’t complete a successful authentication and redirected back to ISE to complete next page in flow(ex: AUP).&lt;/P&gt;&lt;P&gt;However, Disabling CNA allowing us to manually go to browser and type in http website for automatic redirection and we can be able to complete successful authentication and access the internet.&lt;/P&gt;&lt;P&gt;Let me know what could be the reason and how can we remediate the issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kunal&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 22:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4971280#M585520</guid>
      <dc:creator>kshah2589</dc:creator>
      <dc:date>2023-12-04T22:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4975690#M585650</link>
      <description>&lt;P&gt;Just waiting to see if anyone has any suggestions.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 17:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4975690#M585650</guid>
      <dc:creator>kshah2589</dc:creator>
      <dc:date>2023-12-11T17:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4975785#M585657</link>
      <description>&lt;P&gt;The Apple CNA is not a full-feature browser and is know to cause issues with some portal-based flows. There have also been multiple past instances in which Apple made changes to the CNA without notification which broke previously working flows.&lt;/P&gt;
&lt;P&gt;If the flow works consistently with the CNA bypass feature enabled, the recommendation would be to keep it enabled and communicate the expected behaviour to your users.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 21:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4975785#M585657</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-12-11T21:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4977224#M585703</link>
      <description>&lt;P&gt;Hello Greg,&lt;/P&gt;&lt;P&gt;Please find the additional below observations from testing of different Apple devices with password less SSID. Apple CNA(mini browser) is enabled.&lt;/P&gt;&lt;P&gt;1). &lt;FONT color="#FF6600"&gt;iPad/MacBook laptop&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Connects to SSID &amp;gt;&amp;gt;&amp;gt; Apples Captive Network Assistant brings up the Captive Portal &amp;gt;&amp;gt;&amp;gt; user redirected to Microsoft login page &amp;gt;&amp;gt;&amp;gt; enters credentials and user prompted for 2-digit code in authenticator app to confirm identity &amp;gt;&amp;gt;&amp;gt; user redirected back to ISE for next steps(ex: AUP) &amp;gt;&amp;gt;&amp;gt; &lt;STRONG&gt;the flow works, and user can browse internet. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2).&lt;FONT color="#FF6600"&gt;iPhone with two different scenarios.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;A).&lt;STRONG&gt;iPhone connects to SSID with Microsoft authenticator app is in different device&lt;/STRONG&gt; : the process is same as above mentioned &amp;gt;&amp;gt;&amp;gt;&amp;gt; &lt;STRONG&gt;the flow works, and user can browse internet.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;B). &lt;STRONG&gt;iPhone connects to SSID with Microsoft authenticator app is also in same device&lt;/STRONG&gt; : connects to SSID &amp;gt;&amp;gt;&amp;gt; Apples Captive Network Assistant brings up the Captive Portal &amp;gt;&amp;gt;&amp;gt; user redirected to Microsoft login page &amp;gt;&amp;gt;&amp;gt; enters credentials and user prompted for 2-digit code in authenticator app &amp;gt;&amp;gt;&amp;gt; &amp;nbsp;&lt;FONT color="#FF6600"&gt;User switches to Authenticator app to confirm identity, this action closes the Apple Captive Network Assistant(mini-browser) &amp;gt;&amp;gt;&amp;gt; which breaks the flow and user cannot proceed as Apple CNA starts again and repeats the above loop without success.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know your thoughts and next steps we can take to fix the issue.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kunal Shah&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 14:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4977224#M585703</guid>
      <dc:creator>kshah2589</dc:creator>
      <dc:date>2023-12-13T14:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4984047#M585878</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1586517"&gt;@kshah2589&lt;/a&gt;&amp;nbsp;: I am with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;that the issue is due to the wall-garden by the Apple CNA. Whenever we switch to another app, it terminates the wall-garden process.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2023 23:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4984047#M585878</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-12-22T23:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4984052#M585879</link>
      <description>&lt;P&gt;Hello hslai,&lt;/P&gt;&lt;P&gt;Thanks for reference. I am not sure what you mean by that, if you can rephrase for me. what's the solution to fix the issue because Android doesn't have the same issue?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kunal Shah&lt;/P&gt;</description>
      <pubDate>Sat, 23 Dec 2023 00:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4984052#M585879</guid>
      <dc:creator>kshah2589</dc:creator>
      <dc:date>2023-12-23T00:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4985355#M585894</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1586517"&gt;@kshah2589&lt;/a&gt;&amp;nbsp;Just as Greg already suggested,&lt;/P&gt;
&lt;P&gt;&amp;gt; ...&amp;nbsp;&lt;SPAN&gt;with the CNA bypass feature enabled.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-12-26 at 18.32.39.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205873i08FD03D19FF912B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-12-26 at 18.32.39.png" alt="Screenshot 2023-12-26 at 18.32.39.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-12-26 at 18.35.29.png" style="width: 955px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205874i9B45D29D61342672/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-12-26 at 18.35.29.png" alt="Screenshot 2023-12-26 at 18.35.29.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By comparison (at least on my Android test devices), the mini browsers on Android devices seem more capable in handling JavaScript, and multi-webpage on-boarding, and more flexible because it does not terminate the Internet connections when switched to Cisco Network Setup Assistant to complete the cert provisioning, etc.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 02:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/4985355#M585894</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-12-27T02:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315821#M597561</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I’m resurrecting this old thread to check whether there have been any improvements or viable workarounds for Apple devices in recent years.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As previously discussed, the Captive Web Portal flow using SAML login (Microsoft Entra ID) still appears to break on Apple devices. Specifically, the issue occurs when users authenticate via the Microsoft Authenticator app—the Apple Captive Network Assistant (CNA) mini-browser closes once the app is launched, and users are not returned to the portal, breaking the login process.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have there been any updates, best practices, or configuration changes from Cisco or Microsoft to mitigate this behaviour?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Appreciate any guidance or recommendations.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 22:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315821#M597561</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2025-07-30T22:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315823#M597563</link>
      <description>&lt;DIV id="bodyDisplay_6fc95532e7592e_e6de3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;SPAN&gt;I’m resurrecting this old thread to check whether there have been any improvements or viable workarounds for Apple devices in recent years.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As previously discussed, the Captive Web Portal flow using SAML login (Microsoft Entra ID) still appears to break on Apple devices. Specifically, the issue occurs when users authenticate via the Microsoft Authenticator app—the Apple Captive Network Assistant (CNA) mini-browser closes once the app is launched, and users are not returned to the portal, breaking the login process.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have there been any updates, best practices, or configuration changes from Cisco or Microsoft to mitigate this behaviour?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Appreciate any guidance or recommendations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 30 Jul 2025 22:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315823#M597563</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2025-07-30T22:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315834#M597565</link>
      <description>&lt;P&gt;Our team has tried everything to fix the issue but no updates have been provided from microsoft/apple.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 22:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315834#M597565</guid>
      <dc:creator>kshah2589</dc:creator>
      <dc:date>2025-07-30T22:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315835#M597566</link>
      <description>&lt;P&gt;So we were unable to continue to implement the solution.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 22:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5315835#M597566</guid>
      <dc:creator>kshah2589</dc:creator>
      <dc:date>2025-07-30T22:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5316542#M597593</link>
      <description>&lt;P&gt;Thank you so much for your reply!&lt;/P&gt;
&lt;P&gt;It’s unfortunate — we tested the flow without the &lt;STRONG&gt;Apple Captive Network Assistant (CNA)&lt;/STRONG&gt;, but despite using publicly signed certificates, the device still displayed certificate warnings. Disabling the CNA entirely doesn’t seem like a practical solution, especially for non-technical users.&lt;/P&gt;
&lt;P class="p1"&gt;It’s also disappointing that &lt;SPAN class="s1"&gt;&lt;STRONG&gt;DHCP Option 114&lt;/STRONG&gt;&lt;/SPAN&gt;, which is &lt;SPAN class="s1"&gt;&lt;STRONG&gt;Apple’s recommended method&lt;/STRONG&gt;&lt;/SPAN&gt; for launching the portal in Safari (instead of the limited mini-browser), isn’t currently supported by Cisco WLC or ISE.&lt;/P&gt;
&lt;P class="p1"&gt;I am aware that &lt;SPAN class="s1"&gt;&lt;STRONG&gt;Apple iOS 18&lt;/STRONG&gt;&lt;/SPAN&gt; introduces some improvements around captive portals but unfortunately I cannot see any enhancements specifically for thie issue: switching to the Microsoft Authenticator app still causes the CNA browser to close and break the login flow. DHCP Option 114 support on the network side would be the most effective route forward, but it’s currently not implemented by Cisco.&lt;/P&gt;
&lt;P class="p1"&gt;As it stands, Android devices work well, but for iOS, the limitations with CNA + SAML + Authenticator remain unresolved.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2025 18:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5316542#M597593</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2025-08-01T18:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5346423#M598938</link>
      <description>&lt;P class="my-2 [&amp;amp;+p]:mt-4 [&amp;amp;_strong:has(+br)]:inline-block [&amp;amp;_strong:has(+br)]:pb-2"&gt;I’ve spent a couple of days setting up DHCP Option 114 and an API server to return the user portal URL for Apple devices. But even after all that, macOS and iOS still open the captive portal URL inside their mini-browser, which messes up the number matching in the Microsoft Authenticator app.&lt;/P&gt;
&lt;P class="my-2 [&amp;amp;+p]:mt-4 [&amp;amp;_strong:has(+br)]:inline-block [&amp;amp;_strong:has(+br)]:pb-2"&gt;So, from my experience, even with DHCP Option 114 in place, Apple devices still break the MFA flow by launching the portal in that mini-browser instead of Safari or the default browser.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 10:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5346423#M598938</guid>
      <dc:creator>irfsalam</dc:creator>
      <dc:date>2025-11-12T10:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5346563#M598944</link>
      <description>&lt;P&gt;iOS 26 is the same also. Still only working on Android.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 18:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5346563#M598944</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2025-11-12T18:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5348426#M599017</link>
      <description>&lt;P&gt;The only other thing I can think of trying is 'turning off' the Mini-Captive Browser i.e. disabling Captive Portal detection.&lt;/P&gt;
&lt;P&gt;So, from the Cisco 9800 Wireless Controller enabling&amp;nbsp;&lt;SPAN&gt;captive portal bypass.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 15:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5348426#M599017</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2025-11-19T15:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5349042#M599055</link>
      <description>&lt;P&gt;I have now re-tested using the 'Captive Bypass Portal' feature on Cisco 9800. This allowed the Apple iPad/iPhone with the Microsoft Authenticator App on the same device to login via the Captive Portal Page using Cisco ISE - Azure SAML.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disabling Apple Captive Portal detection seems to be the only way to get this to work. By preventing the Mini-browser from opening it stops the session from being closed when the Microsoft Authenticator App is opened.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 14:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5349042#M599055</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2025-11-21T14:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SAML SSO based Password less BYOD flow for Apple device</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5374995#M599989</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We have this workaround implemented now, it requires the user to open Safari and trigger the re-direction via HTTP webpage....&lt;/P&gt;
&lt;P class="p1"&gt;In summary,&lt;/P&gt;
&lt;P class="p1"&gt;Apple iOS opens captive portals in a mini-browser (CNA). When Microsoft Entra authentication requires the Microsoft Authenticator app to open on the same device, the mini-browser session closes and the login process fails.&lt;/P&gt;
&lt;P class="p1"&gt;To resolve this, Apple captive portal detection was effectively bypassed by allowing access to &lt;SPAN class="s1"&gt;&lt;STRONG&gt;captive.apple.com / Apple connectivity check domains in the pre-auth ACL on Wireless Controller&lt;/STRONG&gt;&lt;/SPAN&gt;. This prevents the Apple mini-browser from launching and allows authentication to occur in the full Safari browser instead, enabling the Microsoft Authenticator app to open and complete the login.&lt;/P&gt;
&lt;P class="p1"&gt;As a result, of 'disabling' Apple CNA, the login page will not automatically appear when connecting to Wi-Fi. Users must open a browser and visit a &lt;SPAN class="s1"&gt;&lt;STRONG&gt;non-HTTPS website (e.g. &lt;A href="http://neverssl.com" target="_blank" rel="noopener"&gt;http://neverssl.com&lt;/A&gt;)&lt;/STRONG&gt;&lt;/SPAN&gt; to trigger the redirect to the Cisco ISE login portal.&lt;/P&gt;
&lt;P class="p1"&gt;As we have a single portal with Employee Login for Guest and Visitor Self Registration for Guest, these instructions are provided to the Employees and Visitors and a link to the HTTP webpage via QR code. The customer has set up an HTTP webpage, i.e. &lt;A href="http://wifi.[thecustomer].com" target="_blank" rel="noopener"&gt;http://wifi.[thecustomer].com&lt;/A&gt;&amp;nbsp;as part of this process.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2026 11:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-saml-sso-based-password-less-byod-flow-for-apple/m-p/5374995#M599989</guid>
      <dc:creator>joshhunter</dc:creator>
      <dc:date>2026-03-06T11:43:56Z</dc:date>
    </item>
  </channel>
</rss>

