Using different deployment types and application configuration software, the Zoom client can be locked down to join meetings hosted by certain accounts, have login restricted to certain domains, and have other settings disabled via remote management.
The Windows Zoom Desktop Client can be configured in 3 different ways: via the MSI installer for both configuration and installation, an Active Directory administrative template utilizing Group Policy for configuration, or via registry keys for configuration. For more information on deploying using these methods, as well as other setting configurations, please see our Windows mass installation guide.
For macOS, the Zoom Desktop Client can be deployed using plist configuration files. This installation requires configuring a .plist file and installing it along with the Zoom for IT Admins Installer for Mac.
For Android and iOS, the Zoom client can be locked to allow login with certain email domains. This can be done using multiple MDM methods including using AirWatch and Intune for both Android and iOS.
This article covers:
Windows:
macOS:
Android OS:
iOS:
To configure the Windows Zoom client to only allow joining meetings for certain accounts, the following parameter would need to be added to the install command line: ZConfig=" login_domain=domain". In the command, the domain will be the email domain for students and faculty.
msiexec /package ZoomInstaller.msi /norestart /lex msi.log ZConfig= "login_domain=domain"
Example:
If your organization's account ID number is "school.com", then the install command and ZConfig parameter would be:
msiexec /package ZoomInstaller.msi /norestart /lex msi.log ZConfig= "login_domain=school.com"
System Administrators can also set the setting to restrict joining to certain accounts, as well as other settings, using the Group Policy Administrative Templates. Once the template has been added:
Under "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Zoom\Zoom Meetings\General" the following String Value can be added:
Note: To enter multiple domains for the Value data, add an & between the domains.
To configure the Zoom macOS client to only allow joining meetings for certain accounts, with a .plist deployment, the following key would need to be added to the us.zoom.config.plist file:
<key>login_domain<key>
<string>domain</string>
Example:
If your organization's email domain is "school.edu", then the .plist key would be:
<key>login_domain<key>
<string>school.edu</string>
To configure the Windows Zoom client to only allow joining meetings for certain accounts, the following parameter would need to be added to the install command line ZConfig="account=your_account_id". In the command, your_account_id, will be the account number for your organization's Zoom account.
msiexec /package ZoomInstaller.msi /norestart /lex msi.log ZConfig="account=your_account_id"
Example:
If your organization's account ID number is "111111", then the install command and ZConfig parameter would be:
msiexec /package ZoomInstaller.msi /norestart /lex msi.log ZConfig="account=111111"
Admins can also set the setting to restrict joining to certain accounts, as well as other settings, using the Group Policy Administrative Templates. Once the template has been added:
Under "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Zoom\Zoom Meetings\General" the following String Value can be added:
Note: To enter multiple account IDs for the Value data, add an "," between the account numbers.
To configure the Zoom macOS client to only allow joining meetings for certain accounts, with a .plist deployment, the following key would need to be added to the us.zoom.config.plist file:
<key>CanOnlyJoinMeetingOfAccountID<key>
<string>account ID</string>
Example:
If your organization's account ID number is "111111", then the .plist key would be:
<key>CanOnlyJoinMeetingOfAccountID<key>
<string>111111</string>
System administrators can use mobile device management (MDM) to remotely configure the Zoom app on managed iOS or Android devices. The following login restrictions are available:
Feature | Key Name | Type | Value Example |
Restrict login to specific domains | SetEmailDomainsRestrictedToLogin | String | Enter "school.edu" to restrict logins to users with school.edu as their email domain |
Specify if users are required to log in with SSO | ForceLoginWithSSO | Boolean | "True" or "1" to enable |
The vanity URL used to log in using SSO. | SetSSOURL | String | Enter "success" to set the SSO URL as https://success.zoom.us |
System Administrators can also import XML configuration files to deploy to mobile devices as well. This can be useful of deploying configuration with multiple settings.
<managedAppConfiguration>
<version>1.2.10</version>
<bundleId>us.zoom.videomeetings</bundleId>
<dict>
<integer keyName="Key Name">
<defaultValue>
<value>Boolean Value</value>
</defaultValue>
</integer>
<string keyName="Key Name">
<defaultValue>
<value>String Name</value>
</defaultValue>
</string>
</dict>
</managedAppConfiguration>
Example:
Deploying configuration with login domains restricted to "school.edu":
<managedAppConfiguration>
<version>1.2.10</version>
<bundleId>us.zoom.videomeetings</bundleId>
<dict>
<string keyName="SetEmailDomainsRestrictedToLogin">
<defaultValue>
<value>school.edu</value>
</defaultValue>
</string>
</dict>
</managedAppConfiguration>
<dict>
<key>Key Name</key>
<integer>Boolean Value</integer>
<key>Key Name</key>
<string>String Value</string>
</dict>
Example:
Deploying configuration with login domains restricted to "school.edu":
<dict>
<key>SetEmailDomainsRestrictedToLogin</key>
<string>school.edu</string>
</dict>