![]() ![]() If the Duo Mobile check determines that the device satisfies your organization's access policies, such as screen lock enabled, updated OS version, or other configured policy requirements, then that mobile device used to access your Duo-protected application is "trusted". Whether the access request from the mobile device browser was approved with Duo Push or with a different authentication factor (like an SMS passcode), Duo prompts the user to open Duo Mobile to perform a device health check during authentication. The Duo Mobile app already installed and activated for Duo Push on your users' phones can also serve as your Android and iOS managed device verification tool. There's no need to deploy a separate mobile device management (MDM) solution before you can create access policies for mobile device endpoints. Trusted Endpoints is part of the Duo Essentials, Duo Advantage, and Duo Premier plans. You can monitor access to your applications from trusted and untrusted devices, and optionally block access from devices not trusted by your organization. When a user authenticates via the Duo Prompt, we'll check for the access device's management status. Hosted Device Management via Duo SSO Is Now in Public Preview.Was this page helpful? Let us know how we can make it better.ĭuo's Trusted Endpoints feature secures your sensitive applications by ensuring that only known devices can access Duo protected services.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |