The latest Xink application supports Azure AD-joined machines with Azure AD login, not only on-premises AD.
There are few pre-conditions to be met:
- only joined computers are supported, not linked work accounts;
- only login email is supported as an employee id, say if a person logs on as firstname.lastname@example.org, then the employee with email "email@example.com" must exist in Xink.
Follow the steps in the Microsoft article below for Software deployment via Intune.
1.) Please make sure to add the downloaded XinkClientSetupAD.msi from Step 1 above.
2.) Provide configuration details as stated in Step 3 on the Microsoft article (https://docs.microsoft.com/en-us/intune/lob-apps-windows) and ensure that the DomainAuthToken described in the (step 2 above) is added on the Command-line arguments box, followed by /qn tag for a silent installation (users will not be prompted).
3.) Add the target group in your Azure AD and wait for few hours.
4.) Installation of the Xink client is successful on Hybrid-Domain joined device or Azure AD joined devices once 'Xink AD Client' appears on 'Programs and Features' in Control Panel. To confirm that DomainAuthToken is deployed correctly the target device should have the following registry entry.
The ‘emsclient.exe’ is executed next time the user logs in :
And signatures get updated and copied to Signatures folder inside user’s profile.