- 20 Feb 2024
- 1 Minute to read
- DarkLight
- PDF
Corporate Owned iPhone
- Updated on 20 Feb 2024
- 1 Minute to read
- DarkLight
- PDF
The user-experience videos below demonstrate the seamless out-of-the-box experience on iOS / iPadOS that an end user can get when Jamf Trusted Access concepts are implemented in their organization's IT environment.
To obtain such experience the following components have been implemented:
Jamf Pro
Jamf Protect
Jamf Connect
A third-party Identity Provider (Microsoft Entra ID or Okta)
To replicate the same Trusted Access setup in your environment, follow the Trusted Access Implementation Roadmap.
Long version - iOS experience with Microsoft Entra ID
In this video you will see:
A recap of Jamf Trusted Access principles.
Zero-touch, out-of-the-box device enrollement into Jamf Pro.
Customized enrollment process protected by a Single Sign-On login page.
Automatic installation of corporate apps as well as on-demand app installation using Self Service.
How to get instant access to restricted resources using Jamf Trust and Zero Trust Network Access.
Always-on blocking of malicous network traffic, whatever the entry point (browser, message, email, etc).
Comprehensive blocks to prevent users from accessing risky or unwanted websites.
Industry-leading endpoint protection blocking both known malware and malicious behaviors.
Conditional access capabilities continuously assessing device risk levels to protect company data.
Declarative Device Management Software Updates to keep devices secure at all times.
Short version - iOS experience with Okta
Specifically, you will see:
Out-of-the-box MDM enrollment into Jamf Pro
Customized Setup Assistant steps
Zero-touch and instant-on network security, content filtering, and anti-phishing protection
Passwordless on-boarding using Okta Verify
Passwordless, FaceID-based login to Jamf Trust (Jamf's ZTNA networking app) and Dropbox
Dynamic risk-based access control for private and SaaS applications (or any TCP/UDP SaaS or private app).
End user security alerts and policy violation notifications enabling user-driven remediation.