Skip to content

Device Integrity

Device integrity is verified during authentication when a security policy is enabled.

When device integrity check is enabled, the process is as follows:

  1. During authentication, the device's integrity is evaluated.
  2. The system checks token integrity as part of the authentication process.
  3. The device is then marked as either:
    • Trusted — allowed access to the system
    • Not trusted — denied access to the system