Corporate Owned iPhone
  • 20 Feb 2024
  • 1 Minute to read
  • Dark
    Light
  • PDF

Corporate Owned iPhone

  • Dark
    Light
  • PDF

Article summary

The user-experience videos below demonstrate the seamless out-of-the-box experience on iOS / iPadOS that an end user can get when Jamf Trusted Access concepts are implemented in their organization's IT environment.

To obtain such experience the following components have been implemented:

  • Jamf Pro

  • Jamf Protect

  • Jamf Connect

  • A third-party Identity Provider (Microsoft Entra ID or Okta)

To replicate the same Trusted Access setup in your environment, follow the Trusted Access Implementation Roadmap.

Long version - iOS experience with Microsoft Entra ID

In this video you will see:

  • A recap of Jamf Trusted Access principles.

  • Zero-touch, out-of-the-box device enrollement into Jamf Pro.

  • Customized enrollment process protected by a Single Sign-On login page.

  • Automatic installation of corporate apps as well as on-demand app installation using Self Service.

  • How to get instant access to restricted resources using Jamf Trust and Zero Trust Network Access.

  • Always-on blocking of malicous network traffic, whatever the entry point (browser, message, email, etc).

  • Comprehensive blocks to prevent users from accessing risky or unwanted websites.

  • Industry-leading endpoint protection blocking both known malware and malicious behaviors.

  • Conditional access capabilities continuously assessing device risk levels to protect company data.

  • Declarative Device Management Software Updates to keep devices secure at all times.

Short version - iOS experience with Okta

Specifically, you will see:

  • Out-of-the-box MDM enrollment into Jamf Pro

  • Customized Setup Assistant steps

  • Zero-touch and instant-on network security, content filtering, and anti-phishing protection

  • Passwordless on-boarding using Okta Verify

  • Passwordless, FaceID-based login to Jamf Trust (Jamf's ZTNA networking app) and Dropbox

  • Dynamic risk-based access control for private and SaaS applications (or any TCP/UDP SaaS or private app).

  • End user security alerts and policy violation notifications enabling user-driven remediation.


Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.