Salesforce Mobile supported property injection
Posted: Wed May 28, 2025 4:52 am
Microsoft Intune iOS App configuration injection
Add app configuration policies for managed Android Enterprise devices…
Myth: Customers who don’t use Intune MDM can’t use App Protection/Intune MAM.
Fact: For Mobile Application Management (MAM), Salesforce relies on our own implementation through Mobile App Plus to deliver all security capabilities. This enables us to maintain control over our entire stack instead of integrating third party technologies. However, this doesn’t mean you can’t successfully deploy the Salesforce App in an Intune-controlled corporate environment. Intune MAM’s app protection policies make use of Conditional Access/Azure along with Single Sign-On/Multi-Factor Authentication. By enabling advanced authentication for mobile users, you can swizzle the authentication process out of the app and into the native device browser, which Intune supports. To learn more, check out the resources below.
Salesforce Mobile SSO config documentation
Advanced Authentication toggle in MyDomain docs
Trailblazer Community Discussion
Remember, Intune MDM is based on standards while Intune MAM is entirely proprietary. We do not support a wrapper or container app that tries to run the Salesforce App within it (which is essentially what Intune MAM america phone number list does — requiring wrapping up Microsoft SDK into the Mobile App code).
Myth: The ability to copy/paste outside of the Salesforce Mobile App poses a huge risk.
Fact: Customers can block copy/paste other attributes, as well as use the Salesforce Mobile Security add-on for even more granular monitoring and security. Read the How to Secure Your Salesforce Mobile App Salesforce Help article to learn more.
Myth: It’s more work to have non-standard settings outside of Intune.
Fact: Connected App settings are fairly common practice for Salesforce admins and architects. This is done to ensure you have control over your entire stack, rather than integrating third party technologies. You can also use Event Monitoring for visibility into security events that occur on mobile devices and automate actions based on those events. Intune provides similar visibility for its MAM enabled applications.
Add app configuration policies for managed Android Enterprise devices…
Myth: Customers who don’t use Intune MDM can’t use App Protection/Intune MAM.
Fact: For Mobile Application Management (MAM), Salesforce relies on our own implementation through Mobile App Plus to deliver all security capabilities. This enables us to maintain control over our entire stack instead of integrating third party technologies. However, this doesn’t mean you can’t successfully deploy the Salesforce App in an Intune-controlled corporate environment. Intune MAM’s app protection policies make use of Conditional Access/Azure along with Single Sign-On/Multi-Factor Authentication. By enabling advanced authentication for mobile users, you can swizzle the authentication process out of the app and into the native device browser, which Intune supports. To learn more, check out the resources below.
Salesforce Mobile SSO config documentation
Advanced Authentication toggle in MyDomain docs
Trailblazer Community Discussion
Remember, Intune MDM is based on standards while Intune MAM is entirely proprietary. We do not support a wrapper or container app that tries to run the Salesforce App within it (which is essentially what Intune MAM america phone number list does — requiring wrapping up Microsoft SDK into the Mobile App code).
Myth: The ability to copy/paste outside of the Salesforce Mobile App poses a huge risk.
Fact: Customers can block copy/paste other attributes, as well as use the Salesforce Mobile Security add-on for even more granular monitoring and security. Read the How to Secure Your Salesforce Mobile App Salesforce Help article to learn more.
Myth: It’s more work to have non-standard settings outside of Intune.
Fact: Connected App settings are fairly common practice for Salesforce admins and architects. This is done to ensure you have control over your entire stack, rather than integrating third party technologies. You can also use Event Monitoring for visibility into security events that occur on mobile devices and automate actions based on those events. Intune provides similar visibility for its MAM enabled applications.