Solutions
Device management
Remotely manage, and protect laptops and mobile devices.
Orchestration
Automate tasks across devices, from app installs to scripts.
Software management
Inventory, patch, and manage installed software.
Extend Fleet
Integrate your favorite tools with Fleet.
Customers
Stripe + Fleet
Stripe consolidates multiple tools with Fleet.
Foursquare + Fleet
Foursquare quickly migrates to Fleet for device management.
What people are saying
Stories from the Fleet community.
More
Mitch Francese
Mitch Francese
Apple's Platform Single Sign-on (Platform SSO), introduced at WWDC22 alongside macOS Ventura, iOS 17, and iPadOS 17, enables users to sign in to their identity provider credentials once and automatically access apps and websites that require authentication through an IdP.
This guide details how to deploy Okta's macOS Platform SSO extension (Desktop Password Sync) to your Fleet macOS hosts.
If your Identity Provider (IdP) supports Platform Single Sign-on, deploying it in your environment offers a great and secure sign-in experience for your users.
Rather than your users having to enter credentials each time they sign in to an app protected by Okta, the Platform SSO extension will automatically perform the authentication and sync their local macOS password with their Okta password.
This speeds up the authentication process for your employees and enables them to use their Okta credentials to unlock their Mac.
Important: This feature requires the Okta Device Access SKU to enable Desktop Password Sync and Platform SSO functionality. Contact your Okta account representative if you need to purchase this license for your organization.
Before deploying Platform SSO with Okta, ensure you meet these requirements:
First, you'll need to set up the Platform Single Sign-on app in your Okta Admin Console:
Next, download Okta Verify for macOS from the Admin Console (Settings → Downloads). Don't download the Okta Verify package from the Apple App Store, as it lacks the necessary MDM integration features.
Note: If you have devices running macOS 14 Sonoma or later, you must configure Device Access SCEP certificates before proceeding with Platform SSO deployment.
Now create a SCEP certificate profile to deploy via Fleet:
On your Mac, open iMazing Profile Editor. Create a new profile and add a SCEP payload with these settings:
CN=managementAttestation %HardwareUUID%NOTE: Okta currently doesn't support automatic certificate renewal. This means you will need to redeploy the configuration profile prior to expiration. Use the following policy to help find devices with certificates expiring:
-- Returns 1 if all Okta certs are valid for >14 days (PASSING)
-- Returns 0 if any Okta certs expire within 14 days (FAILING)
SELECT 1
WHERE NOT EXISTS (
SELECT 1
FROM certificates
WHERE issuer LIKE '%/DC=com/DC=okta%'
AND CAST((not_valid_after - strftime('%s', 'now')) / 86400 AS INTEGER) <= 14
AND CAST((not_valid_after - strftime('%s', 'now')) / 86400 AS INTEGER) >= 0
);Save this as okta-device-access-scep.mobileconfig.
On your Fleet server, select the team you want to deploy Platform SSO to. Navigate to Software → Add software → Custom package → Choose file.
Select the OktaVerify-Installer.pkg file on your computer, then click the Add software button.
Choose if you want to manually install the Okta Verify app on your hosts or have Fleet automatically do it. If you select Automatic, Fleet will create a policy to detect which hosts do not have the Okta Verify app and install it. If you select Manual, you'll need to trigger the install from the Software tab on individual hosts from the host's details page.
Desktop Password Sync requires multiple configuration profiles to work properly. You'll need to create separate profiles for each component.
Create a new profile in iMazing Profile Editor and add an Associated Domains payload:
B7F62B65BN.com.okta.mobile.auth-service-extensionauthsrv:yourdomain.okta.com (replace with your actual Okta domain)For macOS 15 Sequoia and later, add a second entry:
B7F62B65BN.com.okta.mobileSave as okta-associated-domains.mobileconfig.
View example Associated Domains profile →
Create a new profile and add an Extensible Single Sign-On payload.
For macOS 13 Ventura:
com.okta.mobile.auth-service-extensionB7F62B65BNhttps://yourdomain.okta.com/device-access/api/v1/noncehttps://yourdomain.okta.com/oauth2/v1/tokenFor macOS 14 Sonoma and later: Same as above, but also add these Platform SSO settings:
Example configuration for macOS 14:
<key>PayloadType</key>
<string>com.apple.extensiblesso</string>
<key>PlatformSSO</key>
<dict>
<key>AuthenticationMethod</key>
<string>Password</string>
<key>UseSharedDeviceKeys</key>
<true/>
</dict>
<key>ExtensionIdentifier</key>
<string>com.okta.mobile.auth-service-extension</string>
<key>TeamIdentifier</key>
<string>B7F62B65BN</string>
<key>Type</key>
<string>Redirect</string>
<key>URLs</key>
<array>
<string>https://yourdomain.okta.com/device-access/api/v1/nonce</string>
<string>https://yourdomain.okta.com/oauth2/v1/token</string>
</array>Save as okta-sso-extension.mobileconfig.
View example SSO Extension profile →
You need to create managed app configuration profiles for two preference domains:
Create a new profile and select the Okta Verify Application Domain:
com.okta.mobilehttps://yourdomain.okta.com$FLEET_VAR_HOST_END_USER_IDP_USERNAMEFor macOS 13 Ventura:
com.okta.mobile.auth-service-extensionhttps://yourdomain.okta.com$FLEET_VAR_HOST_END_USER_IDP_USERNAMEFor macOS 14 Sonoma and later: Same as above, plus:
2.0Save as okta-app-config.mobileconfig.
View example App Configuration profile →
Note: These example profiles demonstrate the essential configuration options. For a complete reference of all available settings and options, see Okta's official configuration profile documentation.
To prevent users from changing their local password (since it syncs with Okta), create a security preference profile:
com.apple.preference.securitytrueSave as okta-security-restrictions.mobileconfig.
Now deploy all the configuration profiles to your Fleet hosts:
okta-device-access-scep.mobileconfig (macOS 14+ only)okta-associated-domains.mobileconfigokta-sso-extension.mobileconfigokta-app-config.mobileconfigokta-security-restrictions.mobileconfig (optional)Uploading the profiles to a team in Fleet will automatically deliver them to all macOS hosts enrolled in that team. If you wish to have more control over which hosts receive the profiles, you can use labels to target or exclude specific hosts.
Important: For organizations with both macOS 13 and macOS 14+ devices, you'll need to create separate teams or use labels to deploy the appropriate profile versions to each macOS version.
When the Okta Verify app and Platform SSO configuration profiles are deployed to a host, the end user will receive a notification that says Registration Required: Please register with your identity provider. You should direct your end users to interact with this notification by clicking the Register button that appears when they hover their mouse over the notification.
After clicking the register button in the notification, a Platform Single Sign-On Registration window will appear. After clicking Continue, the user will be prompted for the password they use to log into their Mac.
Next, they'll be prompted to sign into Okta. This is what associates the user's device to their Okta account and enables Desktop Password Sync.
If your organization requires biometrics for Okta FastPass, users will be prompted to set up Touch ID during this process.
Lastly, they'll be prompted to enable the Okta Verify app to be used as a Passkey. The notification will direct them to System Settings and enable the toggle next to the Okta Verify app.
Once registration is complete, the user's local macOS password will sync with their Okta password through Desktop Password Sync. Users can now:
To verify SCEP certificates were deployed correctly on macOS:
1.3.6.1.4.1.51150.13.1For more detailed information about configuring Okta Desktop Password Sync, see the official Okta documentation.
To create and customize configuration profiles, download iMazing Profile Editor.
For SCEP certificate configuration details, see Okta's Device Access SCEP documentation.