• Services
  • About
  • Articles
  • Contact

Free IT Review

Patrick Kittle, October 16 2024

Setting Up Device Trust with Kandji & Okta

SaaS Security Enhanced with Okta & Kandji

By leveraging the strengths of Okta's identity management and Kandji's device management capabilities, businesses can achieve a more secure environment for their SaaS applications. This partnership ensures that only compliant and secure devices can access company resources, reducing the risk of unauthorized access and data breaches. As a result, organisations can confidently embrace digital transformation while maintaining a strong security posture.

This start-to-finish guide shows you exactly how to setup Okta Device Trust with Kandji for Apple devices, in less than an hour.

Don't want to read - just follow along with our simple guide video:

Pre-requisites

Step 1 - Configure the Okta Verify App in ABM and Kandji

Once you have your tenants basic config complete, you are ready to begin. Let's start by adding the Okta Verify App license to your ABM location:

Your new app should now be available in your Kandji tenant (if you don't have Apple Books setup in Kandji, see THIS GUIDE)

Step 2 - Assign the Okta Verify App to your Apple Devices

All devices that will be required to enrol and use device trust will need to have Okta verify pushed to them. Adding it manually on the device will not work as there is a certificate that Kandji uses to ensure the app is authentic and the device is managed by that Kandji tenant.

First - check the Library Item:

Now add the Library Item to your Devices

Note the infinity sign in the app tile - this shows us the app is continually updated and kept in sync. If this is not there, edit the library item to have Install & continuously enforce set.

That's it for assigning the required app to the devices. They should auto-install quite quickly if they are online.

Setup FastPass in Okta

The foundation of device trust is Okta FastPass (and later it can also enable Passwordless). In order to set this up, we simply need to update some Okta policies:

The Global Session Policy

Configure the Enrolment Policy

Enrolment policies ensure that the correct users are prompted to enrol the correct types of authenticators - in this test environment, I want everyone to use passwords and Okta Verify, so let's make sure the enrolment policy requires both:


Note - you can create new polices and assign to user groups if you want to rollout in a staggered fashion, which is advisable to ensure users don't lose access to apps.

Configure the Okta Verify Authenticator

Ensure that under Verification Options Okta FastPass (All Platforms) is checked. This is the key to fastPass working correctly.

Create Your Emergency Backdoor

All too many times you're sure you have configured everything right on ly to lock yourself out completely. It only takes 1 wrong click! So I like to create a temporary user that can access in the top policy without worry that the new policies will affect it.

For my trial tenant - I am jsut have the first rule to be password only and the emergency user is a member of the !FastPass group. No other users will get this policy applied unless you add them to this group.

Step 3 - Setup Authentication Polices

Now at this point, you are likely to lock yourself and everyone else out if you make any small mistake. It is advisable to leave the existing policies in place and also add an "emergency access" user and rule to ensure you can always get back in.

Rules Overview


1. Existing Rule/s - left in to allow the staged rollout

2. Allow Fully Managed Devices

3. Allow Registered Devices 

4. Catch All/Deny

Here we would deny anyone that had not met any of the above rules as best practice.

Note: I have created a group called OKT-FastPass and assigned it to the 2 new policies - this gives me granular control of the rollout.

Setup Okta Kandji Device Trust

After all that - we are finally at the point where we can setup Okta device trust with Kandji!

In reality, if you have done the initial steps well, and tested your rules, this part should be really simple.

Let's Start in Kandji:

Back in Kandji:

Back to Okta

Adding iOS:

Back to Okta (Dizzy yet??)

Note: Your enrolment link is your Kanndji URL suffixed with /enroll

That's the integration set up! We just need to go back to the Okta Verify Library item and ensure Okta Device Trust is turned on!

Turn on Okta Device Trust

Now we really are done with the setup!

All that's left to do is to add a device to Kandji and Login as a user in the OKT-FastPass Group to see if it becomes managed

Adding a Managed Device

1. Enroll a device in Kandji (if you don't have already)

2. Ensure the device gets the Okta Verify App

3. Add an account that's in the OKT-FastPass Group (or whatever you called your group) to Okta Verify - ensure you enable Biometrics as our policy requires this

4. Sign-in to your Okta dashboard. You should go through your auth flow as per the Authentication Policy you set.

The iOS Okta FastPass Experience (including Hardware Token Auth Flow)

Now - you can see your Managed devices in Okta:

What we want to see here is Active | Managed


Active -  device has Okta verify Installed and it was used to login to Okta

Active | Managed - Device has Okta verify deployed from Kandji and has an okta account setup aligned to the FastPass policy

Active | Not Managed - Device has Okta verify but not deployed from Kandji/ABM/The device is not managed by Kandji

Troubleshooting

The 1 issue I faced during this process was devices not showing up as managed. I spen a long time troubleshooting and trying a lot of different changes - in the end I simply removed and re-added the ODT integration. Worked fine the second time.








Written by

Patrick Kittle

Older Setup Free MTA-STS With Cloudflare