{"id":111441,"date":"2024-06-14T10:36:43","date_gmt":"2024-06-14T14:36:43","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=111441"},"modified":"2024-08-16T15:59:36","modified_gmt":"2024-08-16T19:59:36","slug":"understand-device-trust-readiness","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/understand-device-trust-readiness","title":{"rendered":"Understand Device Trust Readiness"},"content":{"rendered":"\n

JumpCloud Mobile Device Trust ensures users can access protected resources only from trusted devices. Using a combination of JumpCloud Go\u2122, JumpCloud Device Management, JumpCloud Protect\u00ae, and Conditional Access Policies (CAPs), you can safeguard access to protected SSO apps on mobile devices. This article covers how to prepare your org to start using JumpCloud Go for Mobile and Mobile Device Trust on Apple and Android devices. <\/p>\n\n\n\n

To configure Device Trust, first enable JumpCloud Go in the Admin Portal. Next, set up JumpCloud Device Management. Depending on your environment, this will require Apple MDM, Android EMM, or both. When your devices are enrolled and managed in JumpCloud, then use Software Management to deploy the JumpCloud Protect app to your devices. Finally, to enforce Device Trust, create a CAP in the Admin Portal to enforce rules around trusted devices.<\/p>\n\n\n\n

Prerequisites<\/strong>: <\/p>\n\n\n\n