Known issue: Conditional access blocking Yuja desktop app

Device compliance-based conditional access policy requires registered and compliant device to sign into Yuja desktop app but access is not granted to user when attempted on a managed and compliant device:

Uploaded Image (Thumbnail)

The corresponding sign-in log entry says device is not managed and not compliant, while in fact it is managed and compliant. It appears that Yuja desktop app is not fully compatible with Microsoft's Single Sign On (SSO) and Conditional Access (CA) and required device telemetry is not being passed onto Intune during authentication.

Since the web version of Yuja is not affected by this issue, the following workaround is available. This assumes that Yuja desktop app is already installed on your computer.

  1. Launch Yuja web app by opening this URL in Microsof Edge browser: https://uwindsor.yuja.com
  2. Click on Login with "University of Windsor Single Sign-On selected" selected in the top-right corner.
    Uploaded Image (Thumbnail)
  3. Once successfully signed in, click on Create Recording on the top of the page then click START. Uploaded Image (Thumbnail)
  4. Check the box next to "Always allow...." and click on Open.
    Uploaded Image (Thumbnail)
Print Article

Related Articles (3)

Any devices used by university employees and related that do not meet the minimum requirements, as defined in the device's assigned compliance policy, will not be granted full access to University apps, systems and data. This includes devices, both university-owned and personal, that are not enrolled in Intune
Conditional Access is rolling out across the UWindsor campus for faculty and staff starting in November 2023. Conditional Access verifies users and their devices employing a set of automated security policies to protect the University network and data. The article covers the current security elements required for a device to stay compliant serving as a platform for relevant KBAs.
By implementing smart device administration and conditional access, we empower every stakeholder to fortify our digital defenses, ensuring robust protection against cyber threats. Together, we safeguard our future and together we will move forward.