Integrate Okta with your MDM software
Configure your Mobile Device Management (MDM) software to manage Okta Verify and to install it on user devices.
Before you begin
Make sure that your MDM software supports managed app configuration. For best results, integrate with MDM software that support these features:
- Use the managed app configuration to configure the key-value pair.
- Set Okta Verify to install on user devices silently and automatically when they enroll in your chosen MDM software.
If you're configuring your MDM software to deploy Okta Verify to Android devices, make sure that Okta Verify is installed in the work profile of the device.
Start this task
This section provides high-level integration instructions for MDM software and configuration tips for some MDM software solutions. For detailed instructions, see the documentation provided by your MDM software solution.
-
Configure your MDM software to manage Okta Verify and to install it on end user devices.
-
Set the Team Identifier to B7F62B65BN.
-
Configure the key-value pair by using your MDM software's managed app configuration as described in their documentation:
-
Domain: Enter the URL of your Okta org.
-
Key: managementHint
-
Value: Enter the Secret Key value that you saved as part of the Configure Device Management for mobile devices procedure.
The key-value pair is case-sensitive.
-
MDM configuration
Use the following information to configure the key-value pairs in your MDM software. As MDM configurations can change, Okta recommends that you always consult the latest documentation for your MDM software solution. The following sections cover configuration settings for some of the most common MDM solutions.
Jamf Pro for iOS
Configure the Okta Verify distribution:
- On the Devices tab on your Jamf Pro dashboard, click Mobile Device Apps and then click + New.
- Select App store app or apps purchased in volume and then click Next.
- Search for Okta Verify. Select the iPhone & iPod touch apps tab, and then click Add beside the Okta Verify app.
- On the General tab of the New Mobile Device App page, select the Convert unmanaged app to managed option. Ignore the rest of the settings and click Save.
- Click the Scope tab, and then click Edit. Define the users or groups that you want to deploy to, and then click Save.
-
Select the App Configuration tab. Copy the following code and paste it into Jamf Pro. Update the information with your secret key:
Copy<dict>
<key>OktaVerify.UDID</key>
<string>$UDID</string>
<key>managementHint</key>
<string>{Your-Okta-Secret-Key}</string>
</dict>
Configure the SSO Extension:
-
On the Devices tab on your Jamf Pro dashboard, click Configuration Profiles.
-
Enter a name for the new profile.
-
In the side bar, scroll down and click Single Sign-On Extensions. Click + Add. Configure the following settings:
-
Payload Type: SSO
-
Extension Identifier: com.okta.mobile.auth-service-extension
-
Sign-on Type: Credential
-
Realm: Okta Device
-
Hosts: Enter your Okta org domain without the protocol prefix, for example yourorg.okta.com.
-
Custom Configuration: Copy the following code snippet into a .plist file on your computer to upload into Jamf Pro. Update the information with your secret key:
Copy<plist version="1.0">
<dict>
<key>OktaVerify.UDID</key>
<string>$UDID</string>
<key>managementHint</key>
<string>{Your-Okta-Secret-Key}</string>
</dict>
</plist> -
Click Save.
-
Workspace ONE for Android
To add, assign, and manage Okta Verify, follow the procedures in the Workspace ONE topic, Add assignments and exclusions to your Android applications with the following settings:
- App Delivery Method: Automatic
- Managed Access: Enable
For other configuration settings, see Okta Verify configurations for Android devices.
Workspace ONE for iOS
Configure the Add Application section:
-
Platform: Apple iOS
-
Source: Search App Store
-
Name: Enter the name of the app. After you click Next, the search finds the app.
-
Details: Keep the defaults, and then click Save & Assign.
Configure the Assignment section:
-
Distribution
-
Name: Enter a name.
-
Assignment Groups: Specify one or more groups.
-
App Delivery Method: Auto
-
-
Restrictions
-
Make App MDM Managed if User Installed: Enable
-
-
Application Configuration
-
Managed Access: Enable
-
Send Configuration: Enable
-
Click +Add and configure the following settings:
-
Configuration Key: managementHint
Value Type: String
Configuration Value: Enter the Secret Key that you generated for your org.
-
-
For other configuration settings, see Okta Verify configurations for iOS devices.
Microsoft Intune for Android
Follow the procedures in the Microsoft Intune topic Add app configuration policies for managed Android Enterprise devices with the following settings:
- Device enrollment type: Managed devices
- Associated App: Okta Verify
- Configuration settings format: Use configuration designer
- Username (string): Enter your username for your Okta org.
Microsoft Intune for iOS
See Deploy Okta Verify to iOS devices with Microsoft Intune.
