{"id":109367,"date":"2024-07-10T14:52:57","date_gmt":"2024-07-10T18:52:57","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=109367"},"modified":"2024-12-02T17:22:11","modified_gmt":"2024-12-02T22:22:11","slug":"get-started-mobile-device-trust","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/get-started-mobile-device-trust","title":{"rendered":"Get Started: Mobile Device Trust"},"content":{"rendered":"\n
JumpCloud Mobile Device Trust brings JumpCloud Go\u2122 to mobile devices and enables seamless, secure access to JumpCloud-protected resources on the go. Using the JumpCloud Protect\u00ae mobile app, users register their device with JumpCloud Go, enabling biometric, passwordless verification when accessing protected resources. <\/p>\n\n\n\n
When you create Conditional Access Policies in combination with JumpCloud Go for Mobile, you enforce Device Trust. This protects your company\u2019s resources by ensuring users can access them only on trusted devices. Using a combination of JumpCloud Device Management, JumpCloud Go, JumpCloud Protect, and Conditional Access Policies (CAPs), you can safeguard access to both the JumpCloud User Portal and individual SSO apps. <\/p>\n\n\n\n
Mobile devices can be trusted when they are enrolled in JumpCloud Device Management, have the JumpCloud Protect app deployed using Software Management, and are registered with JumpCloud Go. After registration, users verify their identity using JumpCloud Go for Mobile and biometrics on their device.<\/p>\n\n\n\n
<\/p><\/div>
<\/p><\/div>
<\/p><\/div>
<\/p><\/div>
Before you enroll in Android Mobile Device Trust (MDT), ensure your device meets the minimum version requirements for both the Android OS<\/strong> and JumpCloud Protect application<\/strong> to effectively enhance your security posture with MDT.<\/p>\n\n\n\n <\/p><\/div> Minimum Version Requirements<\/strong><\/p>\n\n\n\n <\/p><\/div> When you configure CAPs to enforce Mobile Device Trust, users can\u2019t access protected resources on untrusted devices. When users first access a protected resource on a trusted device, they\u2019re redirected to the JumpCloud Protect app to register their device with JumpCloud Go. After entering their credentials (and MFA challenge if enabled by the admin), their device is registered with JumpCloud Go, establishing their device as trusted.<\/p>\n\n\n\n When users access protected resources, they verify their identity using JumpCloud Go via the JumpCloud Protect app with device biometrics, granting access. The hardware-backed JumpCloud Go token is valid for 1 year. <\/p>\n\n\n\n For a mobile device to be considered trusted:<\/p>\n\n\n\n If your users access their company resources from the JumpCloud User Portal, you can create a CAP that restricts access on unmanaged devices. Because users require access to the User Portal to register their devices with JumpCloud Go, rather than explicitly block access, the highest level of MFA is used for authentication.<\/p>\n\n\n\n You can create CAPs for specific SSO apps available to your users. For example, Slack may contain privileged information that you want users to only access from trusted devices. To do so, create a CAP for the Slack SSO app and restrict access on untrusted devices using the Managed Device<\/strong> condition. <\/p>\n\n\n\n After enabling the prerequisite features, configure your mobile devices to start using JumpCloud Go for Mobile and Device Trust:<\/p>\n\n\n\n <\/p><\/div> Additional configuration is required to use the JumpCloud Protect Android app. See JumpCloud Protect Android App<\/a>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Yes, if you don\u2019t enforce CAPs. You can use JumpCloud Go to enable secure and seamless authentication on mobile devices. <\/p>\n<\/div><\/div><\/div>\n\n\n\n Currently, devices must be JumpCloud managed to get access to Mobile Device Trust functionality. See the previous FAQ for more information.<\/p>\n<\/div><\/div><\/div>\n\n\n\n Once you\u2019ve rolled out Mobile Device Trust and enable CAPs to block unmanaged instances, you need to consider forcing a password reset on user accounts. This will terminate long-lived mobile sessions and force user re-authentication. When users re-authenticate, the latest CAPs are evaluated and personal\/unmanaged access is blocked.<\/p>\n<\/div><\/div><\/div>\n\n\n\n Apple\u2019s User Enrollment is currently limited to a single app. If you want complete control of the app (for it to be marked as a Managed Application for example), you need to ask users to delete the personally redeemed application and allow for JumpCloud MDM to push the managed version.<\/p>\n<\/div><\/div><\/div>\n\n\n\n Yes. You will need to install the iOS Protect application and the in-app experience will be a scaled version of the iOS experience but all the functionality required for Mobile Device Trust will exist.<\/p>\n<\/div><\/div><\/div>\n\n\n\n\n
\n
\n
\n
Considerations<\/h3>\n\n\n\n
\n
\n
\n
Enforcing Device Trust <\/h2>\n\n\n\n
\n
Accessing the JumpCloud User Portal <\/h3>\n\n\n\n
Protecting Individual SSO Apps <\/h3>\n\n\n\n
Admin Configuration Workflow<\/h2>\n\n\n\n
\n
\n
\n
\n
\n
\n
\n
FAQ<\/h2>\n\n\n\n
\n
\n
\n
\n
\n
\n
\n
\n