Roberto Dip
Roberto Dip
This guide will show you how to install Okta Verify on your macOS hosts and set them as managed by issuing a SCEP certificate via a configuration profile managed through Fleet.
By following these steps, you can automate the deployment of Okta Verify across your devices. This will allow you to enforce multifactor authentication policies, improve device security, and manage user access seamlessly.
Okta Verify can be installed:
After installing Okta Verify on the host, the device will be registered in Okta.
The next step to ensure Okta detects the device as managed is to issue a SCEP certificate.
[REPLACE_WITH_CHALLENGE]
with the SCEP challenge you generated in the previous step.[REPLACE_WITH_URL]
with the URL to your SCEP server.CN
value according to your organization's needs. You can use any of the profile variables to uniquely identify your device. In the example %ComputerName%
managementAttestation
%HardwareUUID%,
the certificate Common Name (CN) will contain both the computer name and the hardware UUID.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple Inc//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadIdentifier</key>
<string>Ignored</string>
<key>PayloadUUID</key>
<string>Ignored</string>
<key>PayloadDisplayName</key>
<string>SCEP device attestation</string>
<key>PayloadContent</key>
<array>
<dict>
<key>PayloadContent</key>
<dict>
<key>Key Type</key>
<string>RSA</string>
<key>Challenge</key>
<string>[REPLACE_WITH_CHALLENGE]</string>
<key>Key Usage</key>
<integer>1</integer>
<key>Keysize</key>
<integer>2048</integer>
<key>URL</key>
<string>[REPLACE_WITH_URL]</string>
<key>AllowAllAppsAccess</key>
<true />
<key>KeyIsExtractable</key>
<false />
<key>Subject</key>
<array>
<array>
<array>
<string>O</string>
<string>Fleet</string>
</array>
</array>
<array>
<array>
<string>CN</string>
<string>%ComputerName% managementAttestation %HardwareUUID%</string>
</array>
</array>
</array>
</dict>
<key>PayloadIdentifier</key>
<string>com.apple.security.scep.C2D94E67-4F1A-4A3C-8142-7523A8D35713</string>
<key>PayloadType</key>
<string>com.apple.security.scep</string>
<key>PayloadUUID</key>
<string>632289FA-C3E0-481A-A417-BF40012FB729</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</array>
</dict>
</plist>
Make sure to use
.mobileconfig
as the file extension
SELECT * FROM certificates where common_name like '%managementAttestation%';
With Okta Verify installed and an attestation certificate in place, all left is to configure Okta and the device for device management, useful links from the Okta documentation are:
Make sure the device is properly set up in Okta and that the user has used Okta FastPass at least once to see it as managed on the Okta dashboard.
This guide covered how to install Okta Verify on your macOS hosts, issue a SCEP certificate for management attestation, and configure device management in Okta. By automating this process through Fleet, you can enforce multi-factor authentication, improve device security, and ensure that devices accessing your organization’s resources are properly managed.
For more detailed information on managing devices and using Okta Verify, explore the Okta documentation and Fleet’s guides to optimize your device management strategy further.
See Fleet's documentation and additional guides for more details on advanced setups, software features, and vulnerability detection.