cancel
Showing results for 
Search instead for 
Did you mean: 

Okta Device Trust with JumpCloud - MacOS & Windows

shawnsong
Rising Star III
Rising Star III

Hi Folks,

It's been a while since my last post, but here I am again! Massive kudos to our wonderful teammates Charlie and Rosham, who did most of the heavy lifting for this solution. 


Let’s dive in. 

Setting up on JumpCloud

  1. You might need a staging device ideally running Windows and not used by an actual user:
    1. Enroll it with JumpCloud.
    2. Bind a JumpCloud managed admin account. 
  2. Enable the conditional access policy and distribute the device trust cert to all devices. 
  3. Create a command to deploy Okta Verify app on Windows, you may take reference to the Powershell code below: 
    # Modify the URL to your okta domain
    $url = "https://<your-okta-domain>.okta.com/api/v1/artifacts/WINDOWS_OKTA_VERIFY/download?releaseChannel=GA&packageType=EXE"
    $outputPath = "C:\Temp\okta_verify.exe"  # Change this path as needed
    
    # Create the directory if it does not exist
    $dir = [System.IO.Path]::GetDirectoryName($outputPath)
    if (-not (Test-Path -Path $dir)) {
        New-Item -ItemType Directory -Path $dir
    }
    
    # Download the EXE file
    Invoke-WebRequest -Uri $url -OutFile $outputPath
    
    # Install the EXE for all users silently
    Start-Process -FilePath $outputPath -ArgumentList "/silent /install /norestart /verysilent /quiet" -NoNewWindow -Wait
    
    1. You can find the download URL and replace it in line 2 here:shawnsong_2-1721805812111.png

       

  4. Deploy Okta Verify as a VPP on MacOS devices. 
 

On To The Staging Windows Device

  1. Login as the managed JumpCloud user with admin permissions. 
  2. Hit the Windows start - “MMC”.shawnsong_3-1721805888646.png
  3. Add certificates snap-in -> Current user.shawnsong_5-1721805938763.png
     
  4. Navigate to “Intermediate certificate authorities” -> Certificates. Locate “JumpCloud Production Device Identification Issuer CA”.shawnsong_6-1721806005740.png 
  5. Export the certificate as Base-64 or Binary encoded format:shawnsong_8-1721806045068.png
     
     
  6. Choose a name and a file location and save.
  7. Keep the certificates in a safe place. 

 

Configuration On Okta

  1. Login as Okta admin, navigate to Security->Device Integrations.
  2. Select the “Certificate Authority” tab and click “Add certificate authority:shawnsong_9-1721806109811.png
  3. Upload your “JumpCloud Production Device Identification Issuer CA” and keep “endpoint management” selected.
  4. Once it’s done, it looks like this:shawnsong_10-1721806148439.png 
  5. On the same page, go to “Endpoint management” tab and “Add platform” -> Select Desktops:shawnsong_12-1721806189031.png

     

     

  6. On the next screen, select ‘Use my own certificate authority’ and save.shawnsong_14-1721806283971.png
     

     

  7. Now, all we need is to apply the Device Trust policies to an application in Okta. Here’s an example
     
     shawnsong_17-1721808762846.pngshawnsong_18-1721808781871.png

     

  8. Done!

 

Testing The User Experience

It looks like this on MacOS (Windows is very similar)

 

Note: There might be a prompt for allowing Okta Verify accessing JumpCloud Device Trust Key on MacOS, you can:

  • Add "Okta Verify" as the keychain trusted app.  
  • Or if you somehow still getting the prompt, refer to the steps here to input the password. (less recommended) shawnsong_19-1721808877889.png

And last but not least - on Okta admin console -> Directory -> Devices, these devices will show up as “Managed” here:shawnsong_20-1721808906288.png

That’s it, hope you enjoyed it and stay tuned for my next post 😀

 

0 REPLIES 0