Events
Microsoft 365 Community Conference
May 6, 2 PM - May 9, 12 AM
Skill up for the era of AI at the ultimate community-led Microsoft 365 event, May 6-8 in Las Vegas.
Learn moreThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Many frontline workers use shared mobile devices to do work. Shared devices are company-owned devices that are shared between employees across tasks, shifts, or locations.
Here’s an example of a typical scenario. An organization has a pool of devices in charging cradles to be shared across all employees. At the start of a shift, an employee picks up a device from the pool, and signs in to Microsoft Teams and other business apps essential to their role. At the end of their shift, they sign out and return the device to the pool. Even within the same shift, a worker might return a device when they finish a task or clock out for lunch, and then pick up a different one when they clock back in.
Shared devices present unique security challenges. For example, employees might have access to company or customer data that shouldn’t be available to others on the same device. Organizations deploying shared devices must define the sign-in and sign-out experience and implement controls to prevent unauthorized or unintended access to apps and data when devices are handed off between employees.
This article covers capabilities and considerations for deploying and managing shared devices to help empower your frontline workforce with the devices they need to get work done. Use this guidance to help plan and manage your frontline deployment.
We recommend using shared device mode for your frontline worker shared devices, whenever possible.
Shared device mode is a Microsoft Entra ID feature that allows organizations to configure an Android, iOS, or iPadOS device so that it can be easily shared by multiple employees. Employees can sign in once and get access to their data across all supported apps without having access to other employees’ data. When they finish their shift or task, they sign out once and get signed out of the device and all supported apps, making the device ready for the next employee to use.
You can set up devices for shared device mode manually or through your mobile device management (MDM) solution using zero-touch provisioning. To learn more, see Overview of shared device mode.
Developers can add support for shared device mode to your apps using the Microsoft Authentication Library (MSAL). For more information about how to integrate your apps with shared device mode, see:
Microsoft Entra multifactor authentication (MFA) adds additional security over only using a password when a user signs in. MFA is a great way to increase security, although it might add friction to the sign-in experience for some users with the extra layer of security on top of having to remember their passwords.
It’s important to validate the user experience before your rollout so you can prepare for change management and readiness efforts.
If MFA isn’t feasible for your organization, you should plan to implement robust Conditional Access policies to reduce security risk. Some common Conditional Access policies to apply when MFA isn’t used on shared devices include:
Be sure to evaluate Conditional Access policies and app protection policies you want to apply to ensure they meet the needs of your organization.
You can simplify the sign-in experience on Teams for iOS and Android by prefilling the domain name on the sign-in screen for users on shared and managed devices.
Users sign in by entering only the first part of their user principal name (UPN). For example, if the username is 123456@contoso.com or alexw@contoso.com, users can sign in by using only "123456" or "alexw", respectively, and their password. Signing in to Teams is faster and easier, especially for frontline workers on shared devices, who sign in and out regularly.
You can also enable domain-less sign in for your custom line-of business (LOB) apps.
Learn more about domain-less sign-in.
The QR code authentication method enables frontline workers to sign in efficiently in apps on shared devices. Users can use a unique QR code provided to them and enter their PIN to sign in, eliminating the need to enter intricate usernames and passwords. Currently, QR code authentication is supported only on mobile devices that run iOS/iPadOS or Android.
Use Conditional Access policies to apply the right controls when needed to keep your organization secure. You can create rules that limit access based on identity-driven signals that include:
For example, you can use a Conditional Access policy to restrict access so that only shared devices that are marked as compliant can access your organization's apps and services. Here are some resources to help you get started:
With mobile application management (MAM) from Intune, you can use app protection policies to ensure that data doesn’t leak to apps that don’t support shared device mode. To help prevent data loss, enable the following app protection policies on shared devices:
On a shared device, it’s important to remove unnecessary screens that could pop up when a user accesses an app the first time. These screens can include prompts to grant the app permission to use device features, such as the microphone or camera, or access location. You can use app configuration policies in Intune on Android shared devices to preconfigure app permissions to access device features.
If you're using a third-party MDM solution, check the documentation for options available to automatically grant consent to apps to access device features.
Events
Microsoft 365 Community Conference
May 6, 2 PM - May 9, 12 AM
Skill up for the era of AI at the ultimate community-led Microsoft 365 event, May 6-8 in Las Vegas.
Learn more