Deploy Okta Verify to iOS devices with Microsoft Intune
You can use this procedure to deploy Okta Verify to iOS devices using Microsoft Intune as your Mobile Device Management (MDM) solution.
- Get an Apple MDM push certificate
- Enroll your iOS devices
- Push Okta Verify to iOS devices
- Create an app configuration policy for iOS devices
- Configure seamless SSO for iOS devices
Get an Apple MDM push certificate
Complete the Microsoft procedure to get an Apple MDM Push certificate.
Enroll your iOS devices
Complete the Microsoft procedure to enroll iOS and iPadOS devices in Microsoft Intune.
Push Okta Verify to iOS devices
-
In the Microsoft Intune admin center, go to Apps.
-
Go to All apps and click Create.
-
In the Select app type pane, select iOS store app.
-
Click Select.
-
Click Search the App Store.
-
Enter Okta Verify in the search field and click Okta Verify to choose it from the list of results.
-
Click Select.
-
On the App information tab of the Add App page, enter the following information:
-
Name: Enter a name for the app, for example, iOS Okta Verify.
-
Description: Enter a description for the app.
-
Publisher: Enter Okta, Inc.
-
Minimum operating system: If this field isn't automatically populated, enter the minimum required operating system on which the app can be installed.
-
Applicable device type: If this field isn't automatically populated, select the device types that can use the app.
You can configure other settings that aren't listed here, but these fields are required.
-
- Click Next.
-
On the Assignments tab of the Add App page, assign the app to your relevant groups. Click Next.
-
On the Review + create tab of the Add App page, review the app information, and click Create.
Create an app configuration policy for iOS devices
-
In the Microsoft Intune admin center, go to Apps.
-
Go to .
-
Click Create and select Managed devices.
-
Open the Basics tab of the Create app configuration policy page, and enter the following information:
-
Name: Enter a name for the policy.
-
Description: Enter an optional description for the app configuration.
-
Platform: Select iOS/iPadOS.
-
Targeted app: Click Select app. Then select the Okta Verify iOS app that you added in the previous task and click OK.
-
-
Click Next.
-
Open the Settings tab of the Create app configuration policy page, and enter the following information:
-
Configuration settings format: Select Use configuration designer.
-
Enter the following values for the XML property list:
-
Configuration key: managementHint
-
Value type: String
-
Configuration value: Enter the secret key that you obtained from the Okta Admin Console. See Configure Device Management for mobile devices.
-
-
-
Click Next.
-
On the Assignments tab of the Create app configuration policy page, assign the app to the appropriate groups. Click Next.
-
On the Review + create tab of the Create app configuration policy page, review the app configuration.
-
Click Create.
Configure seamless SSO for iOS devices
You can configure seamless SSO so that users don't see additional Okta Verify browser prompts when they sign in. Instead, Okta Verify silently signs in the user or prompts the user for Touch ID when they access an app in your org.
Before you begin, ensure that Safari is the default browser on the managed device.
-
In the Microsoft Intune admin center, go to Devices.
-
Under the Manage devices by platform tab, click iOS/iPadOS.
-
Go to .
-
Click Create and select New Policy.
-
On the Create a profile page, enter the following information:
-
Platform: Select iOS/iPadOS.
-
Profile type: Select Templates and then select Device features.
-
-
Click Create.
-
On the Basics tab of the Device features page, enter the following information:
-
Name: Enter a name for the profile, for example, iOS seamless SSO
-
Description: Enter an optional description for the profile.
-
-
Click Next.
-
Open the Configuration settings tab of the Device features page and expand the Single sign-on app extension section. Enter the following information:
-
SSO app extension type: Select Credential.
-
Extension ID: Enter com.okta.mobile.auth-service-extension
-
Team ID: Optional. Enter the 10-character team identifier of your SSO app extension generated by Apple.
-
Realm: Enter Okta Device
-
Domains: Enter your Okta org domain, without the protocol prefix. For example, instead of https://yourdomain.example.com, enter yourdomain.example.com
-
Additional configuration: Enter the following:
-
Key: Enter managementHint
-
Type: Select String
-
Value: Enter the secret key that you obtained from the Okta Admin Console. See Configure Device Management for mobile devices.
-
-
-
Click Next.
-
On the Assignments tab of the Device features page, assign the device features to the appropriate groups. Click Next.
-
On the Review + create tab of the Device features page, review the configuration.
-
Click Create.
You can confirm that the SSO profile installed successfully on an iOS device. Go to and confirm that the SSO profile is listed.
