Device Authentication - Overview | Admin Guide - Device Authentication

Device Authentication - Overview

Zoho Directory provides single sign-on for all cloud applications, but employees need to log in to their devices with a different set of credentials. Enabling Device Authentication lets you enroll and manage all your workspace devices like Mac, Windows, and Linux, as well applications in your organization with a single set of credentials. In other words, multiple devices can be authenticated with the technique of single encryption. This is performed by synchronizing your Zoho One password with the logins of a device.

A Device Authentication lifecycle starts with enabling a new device, followed by device enrollment. After enrollment, a user is assigned or unassigned from their device by thier IT admin, as per the organization's needs.

IT admins can perform critical actions such as assign/unassign device, deactivate/activate device, change permission, reset password, and sync password directly from Zoho Directory, thus saving a lot of time.

Assign user

Once a device is configured and enrolled, you can assign a user to that device. After assigning the user to the device, user will be able to access the device and all the ZD apps using the same set of credentials. Learn more

Unassign user

When a user no longer uses their device or leaves the organization, you can unassign the user from their device and they will no longer have access to it. The device can be assigned to a different user at a later point of time. 

Deactivate device

If an enrolled device is defective, damaged, lost, misplaced, stolen, or no longer in use, you can deactivate the device. Once the device is deactivated, no user can access the device until the device is reactivated. Learn more

Delete device

When an enrolled device is no longer required for an organization, the device can be deleted from ZD. Once the device is deleted, it cannot be reactivated, as it would have been permanently removed from ZD, but the device can be re-enrolled. Learn more

Permission change

Organization owner will decide on the user's permission, whether the permission requirement is administrator or standard. Permission can be changed for the users as per the needs of the organization.

Pending action

When the above actions are performed in an enrolled device which goes unreachable or offline, none of the actions will be completed and will be scheduled instead. These are said to be pending actions, which will be completed in priority once the device is reachable or online. Learn more