Free IT Review
By leveraging the strengths of Okta's identity management and Kandji's device management capabilities, businesses can achieve a more secure environment for their SaaS applications. This partnership ensures that only compliant and secure devices can access company resources, reducing the risk of unauthorized access and data breaches. As a result, organisations can confidently embrace digital transformation while maintaining a strong security posture.
This start-to-finish guide shows you exactly how to setup Okta Device Trust with Kandji for Apple devices, in less than an hour.
Once you have your tenants basic config complete, you are ready to begin. Let's start by adding the Okta Verify App license to your ABM location:
Your new app should now be available in your Kandji tenant (if you don't have Apple Books setup in Kandji, see THIS GUIDE)
All devices that will be required to enrol and use device trust will need to have Okta verify pushed to them. Adding it manually on the device will not work as there is a certificate that Kandji uses to ensure the app is authentic and the device is managed by that Kandji tenant.
First - check the Library Item:
Now add the Library Item to your Devices
Note the infinity sign in the app tile - this shows us the app is continually updated and kept in sync. If this is not there, edit the library item to have Install & continuously enforce set.
That's it for assigning the required app to the devices. They should auto-install quite quickly if they are online.
The foundation of device trust is Okta FastPass (and later it can also enable Passwordless). In order to set this up, we simply need to update some Okta policies:
The Global Session Policy
Configure the Enrolment Policy
Enrolment policies ensure that the correct users are prompted to enrol the correct types of authenticators - in this test environment, I want everyone to use passwords and Okta Verify, so let's make sure the enrolment policy requires both:
Note - you can create new polices and assign to user groups if you want to rollout in a staggered fashion, which is advisable to ensure users don't lose access to apps.
Configure the Okta Verify Authenticator
Ensure that under Verification Options Okta FastPass (All Platforms) is checked. This is the key to fastPass working correctly.
All too many times you're sure you have configured everything right on ly to lock yourself out completely. It only takes 1 wrong click! So I like to create a temporary user that can access in the top policy without worry that the new policies will affect it.
For my trial tenant - I am jsut have the first rule to be password only and the emergency user is a member of the !FastPass group. No other users will get this policy applied unless you add them to this group.
Now at this point, you are likely to lock yourself and everyone else out if you make any small mistake. It is advisable to leave the existing policies in place and also add an "emergency access" user and rule to ensure you can always get back in.
Rules Overview
1. Existing Rule/s - left in to allow the staged rollout
2. Allow Fully Managed Devices
3. Allow Registered Devices
4. Catch All/Deny
Here we would deny anyone that had not met any of the above rules as best practice.Note: I have created a group called OKT-FastPass and assigned it to the 2 new policies - this gives me granular control of the rollout.
After all that - we are finally at the point where we can setup Okta device trust with Kandji!
In reality, if you have done the initial steps well, and tested your rules, this part should be really simple.
Let's Start in Kandji:
Back in Kandji:
Back to Okta
Adding iOS:
Back to Okta (Dizzy yet??)
All that's left to do is to add a device to Kandji and Login as a user in the OKT-FastPass Group to see if it becomes managed
1. Enroll a device in Kandji (if you don't have already)
2. Ensure the device gets the Okta Verify App
3. Add an account that's in the OKT-FastPass Group (or whatever you called your group) to Okta Verify - ensure you enable Biometrics as our policy requires this
4. Sign-in to your Okta dashboard. You should go through your auth flow as per the Authentication Policy you set.
Now - you can see your Managed devices in Okta:
What we want to see here is Active | Managed
Active - device has Okta verify Installed and it was used to login to Okta
Active | Managed - Device has Okta verify deployed from Kandji and has an okta account setup aligned to the FastPass policy
Active | Not Managed - Device has Okta verify but not deployed from Kandji/ABM/The device is not managed by Kandji
The 1 issue I faced during this process was devices not showing up as managed. I spen a long time troubleshooting and trying a lot of different changes - in the end I simply removed and re-added the ODT integration. Worked fine the second time.