AppConfig for Mobile Apps when instance is having Azure AD as Identity ProviderSummaryWhen you distribute ServiceNow mobile apps through an EMM suite or an embedded MAM SDK app, you can use AppConfig to pre-configure the default instance URL.Instructions1. Ensure the instance is doing SSO authentication with Azure AD2. Create an App Protection policy for Android and another for iOS restricting data sharing to within Policy-managed apps w/ these settings:- "Send org data to other apps" : "Policy managed apps"- "Receive data from other apps": "Policy managed apps"Public apps: make sure both Edge and the ServiceNow Intune apps are listed3. Create an App Config policy including both iOS and Android versions of the app. Add these settings: "SNAuthenticationBrowserAndroid" set to "Edge" and "SNAuthenticationBrowseriOS" set to "Edge"4. Create an AD Conditional Access policy w/ these settings:- "Cloud apps or actions": Under cloud apps, include the ServiceNow app(s)- "Conditions":- "Device platforms": "android" and "iOS"- "Client apps (Preview)": "Browser"- "Grant": check "Grant access", then select "Require approved client app" and "Require app protection policy"If you have any questions, please let me knowRelated Linkshttps://docs.servicenow.com/bundle/rome-mobile/page/administer/tablet-mobile-ui/reference/appconfig.html