Establish Okta Device Trust with JumpCloud

Learn how to leverage JumpCloud's Conditional Access Policies to act as a device trust factor for your Okta environment. This article is for IT admins who use JumpCloud for device management and Okta for SSO, and want to ensure that users can only access resources from their managed devices.

Prerequisites:

  • You need to have JumpCloud Admin with Billing permissions to configure an IdP. 
  • You need to have a valid Okta account with admin permissions and have configured it as an Identity Provider (IdP). See Configure Okta as an Identity Provider to learn more.
  • All JumpCloud users must have unique company email addresses, and the email of the JumpCloud user and external IdP email used for Federation must match.
  • Conditional Access Policies, which let you relax, restrict, or deny user access to resources, work in tandem with Device Trust Certificates for any policy that uses a device condition. You’ll need to create a conditional access policy before you can implement Device Trust.
  • Enable Global Certificate Distribution in the JumpCloud Admin Portal. To do this,
    • Go to Conditional Policies > Settings.
    • Toggle Global Certificate Distribution to ‘ON’.

Considerations:

  • Once device trust is enforced, users will be redirected to JumpCloud for a certificate check during SSO sign in. To improve the user experience, you can use an Okta policy to enforce this secondary check on a less frequent schedule.
  • Device Trust certificates covered in this article apply only to desktop devices using the JumpCloud Agent and supported web browsers.
  • Certificates are distributed only to JumpCloud managed users on devices.

Important:

This configuration applies only to desktop devices using Device Trust certificates. This configuration doesn't apply to mobile devices.

Configuring Settings in JumpCloud and Okta

Step 1: Configure a Custom OIDC App in JumpCloud

Create a custom OIDC app in your JumpCloud Admin Portal. This app acts as the Identity Provider that Okta will use for authentication.

  1. Log in to your JumpCloud Admin Portal.
  2. Go to User Authentication > SSO.
  3. Click the ‘plus’ icon to add a new application.
  4. Select Custom OIDC App.
  5. Populate the following settings:
  • Redirect URIs: https://dev-xxxx.okta.com/oauth2/v1/authorize/callback (Replace dev-xxxx.okta.com with your Okta tenant URL).
  • Login URL: https://dev-xxxxx.okta.com (Replace with your Okta tenant URL).
  • Attribute Mapping: Map the following attributes (Okta requires preferred_username):
Service Provider Attribute NameJumpCloud Attribute Name
emailemail
preferred_usernameemail

Configuring the Okta SSO OIDC app in the JumpCloud Admin Portal.

  1. Click Activate to save the application. Make a note of the Client ID and Client Secret; you will need them for the next step.

Step 2: Add JumpCloud as an Identity Provider in Okta

Go to your Okta Admin Console and add JumpCloud as an authenticator. This process establishes the connection, so you can use it as a required authentication factor.

  1. Log in to your Okta Admin Console.
  2. Go to Security > Authenticators.
  3. Click Add Authenticator and select IdP Authenticator.
  4. Choose the OpenID Connect option.
  5. Name the authenticator and populate the fields using the information from your JumpCloud OIDC App:
  1. Click Add.
  2. Go back to Security > Authenticators and enroll this new authenticator for your users.
    Add JumpCloud as an Authenticator Identity Provider in the Okta console.

Step 3:  Configure Authentication Policies in Okta

Create an authentication policy in Okta. This policy requires users to authenticate with the "JumpCloud Factor," which triggers the device trust check.

  1. In the Okta Admin Console, go to Security > Authentication Policies.
  2. Add a new policy or edit an existing one.
  3. For testing, you can assign this policy to a specific test application and user group.
  4. Within the policy, add a rule that requires the JumpCloud Factor for authentication. You can set the re-authentication frequency to suit your needs.
  5. Go back to Security > Authenticators and enroll this new authenticator for your users.

Step 4: Configure Conditional Access Policies in JumpCloud

Configure a Conditional Access Policy in JumpCloud. This policy evaluates the device condition and enforces the device trust check you need to protect your resources.

  1. In your JumpCloud Admin Portal, go to SECURITY MANAGEMENT > Conditional Policies.
  2. Click Create Conditional Policy.
  3. Fill out the policy details:
    • General Info: Give the policy a descriptive name, such as "Okta Device Trust."
    • Assignments: Assign the policy to the relevant user groups or "All Users."
    • Conditions:
      • Add a Device condition and select JumpCloud managed device.
      • Add a Location condition, select in country and choose the required countries.
    • Action:
      • Set Access to Allowed.
      • Set Authentication to Password.
  4. Click update policy.
    Creating the Conditional Access Policy for Device Trust in JumpCloud.

After completing these steps, the configuration is ready for testing. Users attempting to access an application protected by your Okta policy will be redirected to JumpCloud for a device trust check, ensuring they are on a managed device before being granted access.

Back to Top

List IconIn this Article

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case