We have an IBM PMR where we already reported this issue to the IBM team.
We would appreciate receiving further updates when possible.
Thanks.
Original Message:
Sent: Mon November 17, 2025 05:34 PM
From: Larry van Elewoud
Subject: Authentication failed for Maximo Mobile for EAM version 9 with SSO
Hi Bincy,
You're welcome! The problem is the authentication cookie returned from the pre-authentication. In the second call to authorize for maximo, this cookie won't be available anymore so authentication fails. As I mentioned we had quite some meetings with IBM developer and a squad team to see if it could be solved. Unfortunately this wasn't the case. If you are fine with it, I would like to inform IBM you ran into this as well. If we can show there are more users experiencing this, it's more likely a solution will be investigated. As far as we were told, this issue isn't solved in MAS 9. And I guess it won't be in 9.1 as well. If in any case I get some new information I will keep you updated.
Glad I could clarify things and help you.
Kind regards,
Larry
------------------------------
Larry van Elewoud
Technical Engineer
Gemba Service B.V.
Netherlands
Original Message:
Sent: Fri November 14, 2025 07:55 AM
From: Bincy Jose
Subject: Authentication failed for Maximo Mobile for EAM version 9 with SSO
Thanks so much Larry.
We could test these settings and it worked for us. Checking with Azure team here whether we can proceed with this option in Production.
Also would like to know if you have some insights on what was the App side code changes which IBM might have included in Mobile 9 version of MAS which allows the app to send device id when we include the conditional access policy and set the property useSystemBrowserLogin=true.
Thanks,
------------------------------
Bincy Jose
Original Message:
Sent: Thu November 13, 2025 02:30 AM
From: Larry van Elewoud
Subject: Authentication failed for Maximo Mobile for EAM version 9 with SSO
Hi Bincy, when pre-authentication is set on the proxy there are to many round trips ending up the authentication to be failed as the login information won't reach your end point.
With pass through you will still have the authentication through Entra-Id (assuming SAML is set up in websphere). The SAML application in websphere will handle the configured redirection to the idsp.
With pass through you are still able to set the deviceid mandatory in inTune and the device id will be received with useSystemBrowserLogin=true
Microsoft information on application proxy:
| Pre Authentication | How application proxy verifies users before giving them access to your application.
Microsoft Entra ID - Application proxy redirects users to sign in with Microsoft Entra ID, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Microsoft Entra security features like Conditional Access and multifactor authentication. Microsoft Entra ID is required for monitoring the application with Microsoft Defender for Cloud Apps.
Passthrough - Users don't have to authenticate against Microsoft Entra ID to access the application. You can still set up authentication requirements on the backend. |
------------------------------
Larry van Elewoud
Original Message:
Sent: Thu November 13, 2025 01:56 AM
From: Bincy Jose
Subject: Authentication failed for Maximo Mobile for EAM version 9 with SSO
Hi Larry,
Thank you for your quick response.
The devices are registered (managed by intune).
When we set the property useSystemBrowserLogin=false , the device id will be captured.
But we need to set this as TRUE while enabling conditional access policy on the Azure App.
Currently we have Pre Authentication set as "Microsoft Entra ID" in Application Proxy, since all the apps should go through EntraID first.
Could you please share more details on "proxy with passthrough was the option" for other customers who faced the same issue.
Does the app captures device id with this option?
Thanks.
------------------------------
Bincy Jose
Original Message:
Sent: Fri November 07, 2025 10:02 AM
From: Larry van Elewoud
Subject: Authentication failed for Maximo Mobile for EAM version 9 with SSO
Hi Bincy, are you being redirected to the login page of the identity service provider? And is Maximo open to the internet or is it behind a proxy?
We have 2 customers using Entra (1 on iOS and 1 on Android). Both working successfully with sending device id. Both on Maximo EAM 7.6.1.3. This is only possible as from version 9.0. So the upgrade has been a good idea. On Android you should also set enable browser access in Microsoft Authenticator (settings -> Device registration -> <your company> -> Enable Browser access -> continue and accept certificate)
For SAML to work on mobile, the maximo property "mxe.useSAML" should be set to one (to have the redirect to the login page specified in your SAML configuration). In some situations ldapisform also needs to be set to 1 if I'm correct.
Make sure you are member of the applicable AD groups. And if behind a proxy, the proxy should be set to pass through (as pre-authentication won't work)
Hope this will help you out a bit.
Cheers,
Larry
------------------------------
Larry van Elewoud
Technical Engineer
Gemba Service B.V.
Netherlands
Original Message:
Sent: Thu November 06, 2025 11:52 PM
From: Bincy Jose
Subject: Authentication failed for Maximo Mobile for EAM version 9 with SSO
Hi All,
We have upgraded from Mobile 8.10 to Mobile 9 to satisfy the authentication flow to pass through the web browser rather than the native application in-app browser like it does on Mobile for EAM 8.10.
We have SSO enabled and applied conditional access policy on the Azure App. Also configured useSystemBrowserLogin=True in MDM configuration properties for Android and ios.
But it seems useSystemBrowserLogin=True works only with Maximo Mobile (MAS app) and not applicable for Maximo Mobile for EAM app. Also, EAM app can't send the Device ID as part of device response and thus conditional access policy needs to be built without using Device ID. Here we have confirmed with Azure team on Conditional access policy that it's not possible to exclude device id from the policy as ENTRA will validate login attempt as "success" only by using the device id.
When we set useSystemBrowserLogin=True property in MDM, app is capturing DEVICEID in Azure sign in logs but the Mobile App is not showing login successful due to "Authentication Failed" error.
Has anyone faced this issue with Maximo 7.6.1.3 and Maximo Mobile for EAM 9.0.
Appreciate your valuable inputs.
Thanks.
------------------------------
Bincy Jose
------------------------------