<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
0D5KZ00001IAhwB0ATOkta Classic EngineAdministrationAnswered2025-09-30T17:03:09.000Z2025-09-10T21:28:33.000Z2025-09-30T17:03:09.000Z

Christina.J (Customer Support Online Community and Social Care) asked a question.

Join the Discussion for Ask Me Anything on September 29, 2025: Okta Device Assurance

Our next Ask Me Anything (AMA) on September 29, 2025, will focus on Okta Device Assurance, a capability that enforces security requirements by ensuring that only trusted, compliant devices can access company resources.

 

In today’s security landscape, compromised or non-compliant endpoints are among the most common causes of breaches and data loss. Device Assurance helps organizations by enforcing consistent security standards across devices—whether managed or unmanaged—while keeping the sign-in experience frictionless.

 

Whether you’re looking for insights on deploying, managing, or scaling Device Assurance, now is the time to ask our product expert. 

 

How can I participate?

Submit your questions by clicking the ‘Answer’ button below anytime between now and Friday, September 26. Then join us in this thread on Monday, September 29, from 9 to 11 a.m. PST as an Okta product expert will post detailed, written responses.

 

Need ideas on what to ask?

  • How to roll out Device Assurance for Android, ChromeOS, iOS, macOS, or Windows
  • How does Device Assurance fit into a Zero Trust strategy
  • Using Device Assurance to restrict access to trusted devices
  • What's on the roadmap and how can feedback help shape it
  • Real-world use cases and the value other customers have seen

 

These are just a few examples. We welcome your unique use cases, challenges, or curiosity, no matter how big or small.

 

Want to learn more about this AMA session? Check out this blog post ---> https://support.okta.com/help/s/blog/a67KZ00000002DOYAY/september-29-ask-me-anything-okta-device-assurance

 

We want to hear your questions. Drop them in now and get expert insight!


RohitU.50441 likes this.
  • ReneeS.97124 (Support Knowledge Management)

    Do I need to use Okta Verify for Device Assurance?

    • KarthigB.75818 (Customer)

      You can use  Okta Verify as one of the device attribute providers for  Device Assurance policies, but it is not the only option.

       

      When creating a  Device Assurance policy, you must select the  device attribute providers. You can choose  Okta Verify,  Chrome Device Trust, or  both as posture providers. If you select both, signals from  Okta Verify take priority over Chrome Device Trust. The device assurance policy conditions are platform-specific and depend on the provider(s) selected.

       

      For more details, see the official documentation on Add a device assurance policy and Device assurance overview.

      Expand Post
  • Do Device Assurance policies allow the prevention of Okta Verify being installed on jailbroken devices?

    • KarthigB.75818 (Customer)

      No,  Device Assurance policies do not prevent the installation of  Okta Verify on jailbroken devices.

       

      Device Assurance policies evaluate device security attributes during authentication to allow or deny access based on compliance with configured conditions. One of the conditions you can configure is  Rooting or  Jailbreak detection, which denies access if the device is jailbroken or rooted. However, these policies  do not control or block the installation of the  Okta Verify app itself.

       

      For more information, see the official Okta documentation on Device assurance remediation messages and Add a device assurance policy.

      Expand Post
  • DianaL.19788 (Customer Support Online Community and Social Care)

    How can I inform users that their device is not compliant?

    • KarthigB.75818 (Customer)

      You can inform users that their device is not compliant by configuring remediation instructions that appear in the  Sign-In Widget when access is denied due to noncompliance with a device assurance policy.

       

      What Users Will See?

      • When a device fails a device assurance check, the  Sign-In Widget displays a remediation message explaining the issue.
      • For example, if a device is jailbroken, the message might say:
      • Your device doesn't meet the security requirements. For more information, follow the instructions on the help page or contact your administrator for help.
      • The remediation instructions help users understand what is wrong and how to fix it, reducing support calls.

       

      Learn more:

      Expand Post
    • KarthigB.75818 (Customer)

      No,  Okta FastPass is  not required to use  Device Assurance policies.

       

      Device Assurance policies work by evaluating device security attributes during authentication, such as OS version, disk encryption, and jailbreak/root status. These policies rely on device attribute providers like  Okta Verify and/or  Chrome Device Trust to collect device posture signals.

       

      Okta FastPass is a separate feature that provides a passwordless, phishing-resistant sign-in experience on devices where  Okta Verify is installed and enrolled. While  Okta FastPass requires  Okta Verify to be installed and enrolled on the device,  Device Assurance policies do  not mandate the use of  Okta FastPass. You can create and enforce  Device Assurance policies without enabling or using  Okta FastPass.

       

      To use  Device Assurance with Okta Verify as the provider, users must have at least one  Okta Verify enrollment to report device health signals. Okta FastPass enhances the authentication experience but is optional for device posture evaluation. Device assurance policies are applied by including them in  authentication policy rules; they are not dependent on  FastPass. You can use  Okta Verify alone,  Chrome Device Trust alone, or both as device attribute providers for device assurance.

       

      For more information, see the official Okta documentation on Device assurance overview and Configure Okta FastPass.

      Expand Post
  • RobertoP.20082 (Customer)

    In the past, I read that only devices managed with vmware Aria or Microsoft SCCM/InTune were eligible... did something change, or is planned to change? we use Meraki MDM for IOS devices, jamf for Macs and plain domain GPO for windows devices...

10 of 16
This question is closed.
Loading
Join the Discussion for Ask Me Anything on September 29, 2025: Okta Device Assurance