Zoho Directory provides single sign-on for all cloud applications, but employees need to log in to their devices with a different set of credentials. Enabling Device Authentication lets you enroll and manage all your workspace devices like Mac, Windows, and Linux, as well applications in your organization with a single set of credentials.
A Device Authentication lifecycle starts with enabling a new device, followed by
device enrollment. After enrollment, a user is assigned or unassigned from their device by thier IT admin, as per the organization's needs.
IT admins can perform critical actions such as assign/unassign device, deactivate/activate device, change permission, reset password, and sync password directly from Zoho Directory, thus saving a lot of time.
Assign user
Once a device is configured and enrolled, you can assign a user to that device. After assigning the user to the device, user will be able to access the device and all the ZD apps using the same set of credentials.
Learn more
Unassign user
When a user no longer uses their device or leaves the organization, you can unassign the user from their device and they will no longer have access to it. The device can be assigned to a different user at a later point of time.
Deactivate device
If an enrolled device is defective, damaged, lost, misplaced, stolen, or no longer in use, you can deactivate the device. Once the device is deactivated, no user can access the device until the device is reactivated.
Learn more
Delete device
When an enrolled device is no longer required for an organization, the device can be deleted from ZD. Once the device is deleted, it cannot be reactivated, as it would have been permanently removed from ZD, but the device can be re-enrolled.
Permission change
Organization owner will decide on the user's permission, whether the permission requirement is administrator or standard. Permission can be changed for the users as per the needs of the organization.
Learn more
Pending action
When the above actions are performed in an enrolled device which goes unreachable or offline, none of the actions will be completed and will be scheduled instead. These are said to be pending actions, which will be completed in priority once the device is reachable or online.
Learn more