Ensure VMware Workspace ONE Compliance Using Okta
Learn how to validate VMware Workspace ONE installation compliance using Okta for effective device management and security in your organization.
Learn how to validate VMware Workspace ONE installation compliance using Okta for effective device management and security in your organization.
When it comes to device security, many organizations use a combination of identity services and device management tools to ensure that secure practices are being adhered to at scale.
In this guide, we’ll be focusing on the combination of Okta and VMware Workspace ONE to run a compliance check to ensure that all employees have Workspace ONE installed on at least one of their devices.
Okta is a leading identity management platform that helps employers establish consistent access and secure authentication across applications.
VMware Workspace ONE is a leading security and application management tool that offers endpoint management and access control across devices and virtual applications.
The following steps will allow you to confirm which users in Okta have at least one active device in your business's VMware Workspace ONE account.
The first step of running this type of compliance check is getting a full list of active users at your organization. You can pull this list directly from Okta using either the Okta Admin UI or via the Okta API.
The Okta API retrieves all users with a maximum of 200 per call. You can use the following syntax to issue a call with parameters:
"https://${companyOktaDomain}/api/v1/users?limit=200"
If you have more than 200 users in your organization, you will likely need to use pagination to pull the full list.
Now that you have a user list from Okta, you need to go to the Workspace ONE Unified Endpoint Management (UEM) console. This is your access point for all enrolled devices within your organization. You can analyze and manage devices of all kinds and on all platforms from this central location.
To check whether users have active devices and confirm mobile device management (MDM) compliance, first navigate to the Workspace ONE UEM console. On the left side of the console, choose Accounts. From this tab, you will be able to access information for all registered users within your organization's account.
In order to fully evaluate device activation, you will need to dive deeper. From the Accounts tab on the Workspace ONE UEM, you can open the user accounts list view, which provides a comprehensive list of all users. The list view includes various data points:
You can also apply filters or sort user information by characteristics such as security type, enrollment status, and user role.
To export this list, click the Export button, select the format (XLSX or CSV), navigate to “Monitor”, then “Reports & Analytics”, and then “Exports” to view and download the resulting report.
To check if users have devices associated with them, you can navigate to the device list view. Here you will find information on all the devices in your account, including fields like:
To export this list, follow the same steps as before. Click the Export button, select the format (XLSX or CSV), navigate to “Monitor”, then “Reports & Analytics”, and then “Exports” to download the report.
Using the combination of the Okta active user list, the Workspace ONE User list, and Device list, you can cross-reference them in Excel with the vlookup function to identify gaps between Okta and Workspace ONE, and users in both tools who don’t have devices registered. you can quickly identify users who have gaps. You can then follow up with them directly to ensure they meet compliance.
As remote work continues to flourish and more employees use mobile devices for their everyday tasks, MDM compliance will play a prominent role in data security. With this compliance check, you can ensure that your organization is achieving security best practices.
This method is very manual and could be time-consuming. With Blink, running queries like this is simple.
This automation, which already exists in the Blink library, runs the following steps:
You can use automations like this one out-of-the-box, or customize them with drag-and-drop actions.
Get started with Blink today and ensure device management compliance in a couple clicks today.
Blink is secure, decentralized, and cloud-native. Get modern cloud and security operations today.