Okta

Octa

Brief description

About Device Trust

About Device Trust

How Device Trust works for iOS devices

Device trust is performed on the condition that the device participates in MDM. (Participated in MDM -> Considered as an authorized device)

How Device Trust works for iOS devices

iOS device trust setup flow

Device Trust for iOS gives a secret key on the MDM side such as Ivanti MobileIron (formerly MobileIron), Microsoft Endpoint Manager (formerly Intune), and VMware WorkSpace One.
This is achieved by registering the Okta Mobile app and distributing Okta Mobile to target iOS devices.

If a user logs in using Okta Mobile without a secret key, it is possible to deny access to a specific application by determining that the device is not a trusted device because there is no secret key. .

Follow the steps below to configure the settings.

  • Enable iOS device trust on Okta side and issue a secret key
  • Register the Okta Mobile app with a secret key on the MDM side and distribute the app to the target iOS devices
  • Applies policy settings to control access to applications on the Okta side

Enable Device Trust on Okta side

  • Go to Security > Device Trust screen and click Edit of iOS Device Trust
Enable Device Trust on Okta side
  • Check Enable iOS Device Trust, select MDM, and click Next
Enable Device Trust on Okta side

*In the above example, select MobileIron

  • Copy the Secret Key value to the clipboard, enter the URL for MDM enrollment (optional) in the Enrollment link, and click SAVE
    *The URL for MDM registration is displayed to the user to prompt MDM registration when an MDM non-registered device accesses. (Do not set if you do not want to prompt MDM enrollment for non-MDM enrolled devices)
Enable Device Trust on Okta side
  • Confirm that there is no problem with the iOS device trust settings, and complete the activation settings
Enable Device Trust on Okta side

Register Okta app on MDM side (for Ivanti MobileIron)

  • Open the management screen of the selected MDM and transition to the application setting screen
    * It is assumed that the application from the MDM side can already be distributed to the target iOS device.
Register Okta app on MDM side (for Ivanti MobileIron)

*In the above example, the management screen of Ivanti MobileIron

  • Click Add and select iOS Store App in App Type
Register Okta app on MDM side (for Ivanti MobileIron)
  • Enter Okta Mobile in the search window, select Okta Mobile and click Next
Register Okta app on MDM side (for Ivanti MobileIron)
  • Okta Mobile information will be reflected, so click next
Register Okta app on MDM side (for Ivanti MobileIron)
  • After configuring the user groups to distribute Okta Mobile to, click Next
Register Okta app on MDM side (for Ivanti MobileIron)
  • After confirming the information of Okta Mobile to be added, click Done. Completion of adding the app (Okta Mobile) itself
Register Okta app on MDM side (for Ivanti MobileIron)
  • In order to assign Okta side secret to the added Okta Mobile, select iOS managed app configuration on Okta Mobile's app configuration tab.
Register Okta app on MDM side (for Ivanti MobileIron)
  • select add
Register Okta app on MDM side (for Ivanti MobileIron)
  • Enter any name
Register Okta app on MDM side (for Ivanti MobileIron)
  • Click Add iOS Managed App Configuration and enter the following information:
  • Domain: Okta Tenant URL (e.g. https://demo.okta.com)
  • managementHint: Secret Key that you copied in advance
Register Okta app on MDM side (for Ivanti MobileIron)
  • Set the configuration distribution target and click Save
Register Okta app on MDM side (for Ivanti MobileIron)
  • If the added configuration is displayed in the list, the setting on the MDM side is complete.
Register Okta app on MDM side (for Ivanti MobileIron)

Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)

  • Open the management screen of the selected MDM and transition to the application setting screen
    *It is assumed that the target iOS device is already ready to distribute the application from the MDM side.
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)

*In the above example, the management screen of Microsoft Endpoint Manager

  • Select iOS/iPadOS by platform to enable Okta Mobile
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • Click Add, select iOS Store App for app type, and click Select.
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • On the Add app settings screen, click Search the app store.
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • Enter Okta Mobile in the search window, select Okta Mobile, and click Select
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • Okta Mobile information will be reflected, so enter any name and click next
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • After configuring the user groups that can use Okta Mobile, click Next
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • After confirming the information of Okta Mobile to be added, click Create. Completion of adding the app (Okta Mobile) itself
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • In order to give the Okta side secret to the added Okta Mobile, select App configuration policy, click Add, Managed device
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • The app configuration policy setting screen will be displayed. Select iOS/iPadOS with any name and platform, and click Select app.
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • After selecting the Okta Mobile you added, click Next
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • Select Use Configuration Designer in Configuration settings format
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • Enter the following information in the configuration key and click Next
  • Domain: Okta Tenant URL (e.g. https://demo.okta.com)
  • managementHint: Secret Key that you copied in advance
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • In Assigned To, select any Assigned Target and click Next
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • Confirm the policy information to be added and click Create
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)
  • If the added policy is displayed in the list, the setting on the MDM side is complete.
Enroll the Okta app on the MDM side (for Microsoft Endpoint Manager)

Set policy on Okta side

  • Transition to Applications > Applications screen. Click any application to apply the Device Trust Policy
Set policy on Okta side
  • Select the Sign On tab and go to the bottom of the page
Set policy on Okta side
  • Click Add Rule in Sign On Policy
Set policy on Okta side
  • Since the policy content setting screen is displayed, enter a name in Rule Name
Set policy on Okta side
  • Check only iOS in CLIENT, select the following items, and click SAVE
  • DEVICE TRUST: Select Trusted
  • ACTIONS ACCESS: Select Allowed
Set policy on Okta side
  • Confirm that the policy has been added to the policy list
Set policy on Okta side
  • Click Add Rule in Sign On Policy again
Set policy on Okta side
  • Since the policy content setting screen is displayed, enter any name in Rule Name
Set policy on Okta side
  • Check only iOS in CLIENT, select the following items, and click SAVE
  • DEVICE TRUST: Select Trusted
  • ACTIONS ACCESS: Select Allowed
Set policy on Okta side
  • Confirm that the corresponding policy has been added to the policy list, and complete the settings
Set policy on Okta side

[Reference] Operation verification of device trust

Set policy on Okta side

Notes on iPadOS

Even if Device Trust is enabled for iOS devices, Device Trust is not enforced when accessing the app from Okta Mobile on iPad. As a result, apps can be accessed from Okta Mobile on unmanaged iPads.

This is because the Okta Mobile app recognizes iPad OS 13 or later as macOS instead of iOS. (Due to the specification change of iPad OS, the user agent became the same as Mac from iPad OS 13)

The corresponding method is as follows.

  • Prevent access to apps from Okta Mobile on iPad
    1. By enabling "Do not display application icon in the Okta Mobile app" in Okta's app settings General, the app icon will not be displayed on Okta Mobile
    2. If this setting is performed, the app icon will not be displayed on Okta Mobile on all iPhone/iPad/Android devices, but in the case of these mobile devices, use SP-Initiated using a dedicated app.
  • If you want to use the app from Okta Mobile on your iPad/Android device, do the following:
    1. If you are not using macOS, set macOS access to Denied in the Sign On Policy
    2. When using macOS, Device Trust is performed on macOS with high priority in Sign On Policy, and Not Trusted macOS is Denied.

Inquiry/Document request

In charge of Macnica Okta Co., Ltd.

Mon-Fri 8:45-17:30