Biometrics/device pin can't be disabled in the EAM app. If you are on MAS 9.1 (not 9.0 or earlier versions) you can disable biometrics/device pin on iOS/Android.
This part of the authentication flow is required to store and retrieve the sqlite database encryption key in the device trust store. iOS/Android require a device pin/biometrics to access the device trust store. Windows does not require Windows hello to be configured so it wasn't needed on that platform even on earlier versions.
In 9.1, the behavior by default is the same as earlier versions and will store the key in the device trust store. But there's an option to not utilize the device trust store with a new API added in MAS to store and retrieve the key on the server. This would mean any users can only login in a connected fashion but for most users that's not an issue.
Original Message:
Sent: Fri October 10, 2025 12:02 AM
From: Sourabh Jain
Subject: Difference in Azure AD SSO behavior between Maximo browser and Maximo Mobile for EAM
Hi Larry,
It worked for us. We are using Entra and we set the useSystemBrowserLogin property to ture.
On Windows platform, we have disabled the bio-matric login so there is no issue. It doesn't ask for the credentials and I can just log in which solves the problem.
Howerver, on iOS devices - it did work in the same way but if I enable the bio-matric, then it goes back to the previous stage. I am now looking for a way to disable the bio-matric on iOS devices as I did in Windows. I referred to the SSO plug-in website that you mentioned and our MDM team confirmed that it's already installed.
Any thoughts please, thanks once again.
------------------------------
[Sourabh] [Jain]
[Cosol]
[Melbourne] [Vic]
Original Message:
Sent: Tue October 07, 2025 04:19 AM
From: Larry van Elewoud
Subject: Difference in Azure AD SSO behavior between Maximo browser and Maximo Mobile for EAM
Hi Sourabh,
As we experienced, the sso (directly logging into the app when opening the app without having credentials to be entered) only works with managed devices.
In Azure in the appconfig.xml the option "useSystemBrowserLogin" should be set to true.
For iOS there is a SSO plugin for Azure, which should be installed on Azure side then (https://learn.microsoft.com/en-us/entra/identity-platform/apple-sso-plugin).
For Android, in MS authenticator, under settings -> device registration -> <company> -> Enable browser access -> continue and accept certificate.
This is possible when the device id is passed through to Azure. (Which is the case as from 9.0 I believe, it has been changed in the App Store app as from version - Android Maximo Mobile for EAM version 1.0.20).
Note, this will only work if Maximo is open to the internet without a pre-authentcation proxy. A proxy with pass through does work.
PS. Also when the session timed out and the user needs to re-login. After a push on the chevron next to the timeout message in the data update menu, the login process will be automatically done without having to enter credentials.
I hope this will help you to get a bit further.
------------------------------
Larry van Elewoud
Technical Engineer
Gemba Service B.V.
Netherlands
Original Message:
Sent: Mon September 22, 2025 10:11 PM
From: Sourabh Jain
Subject: Difference in Azure AD SSO behavior between Maximo browser and Maximo Mobile for EAM
We are using Maximo 7.6.1.3 with Maximo Mobile for EAM 9.0.
SSO with Azure AD is enabled on Maximo 7.6.1.3 and works fine in the browser.
When we log into the Maximo Mobile for EAM app using the same URL, users are redirected to the Microsoft authentication page as expected. However, if a user logs out of the Mobile app and then logs in again, they are always taken back to the Microsoft authentication page and must re-authenticate.
In contrast, when logging into Maximo via a browser: if the user logs out and then logs in again, they are not prompted to re-authenticate with Azure AD (since the browser session persists).
My questions:
Why is there a difference in behavior between the browser and the Maximo Mobile app?
Is there a way to configure the Maximo Mobile app to reuse the Azure AD session (similar to the browser) so users don't need to re-enter their credentials every time after logout?
Or is this the expected design for security reasons?
Any guidance or experience would be appreciated.
#Mobile #SSO
------------------------------
[Sourabh] [Jain]
[Cosol]
[Melbourne] [Vic]
------------------------------