Device Integrity¶
Device integrity is verified during authentication when a security policy is enabled.
When device integrity check is enabled, the process is as follows:
- During authentication, the device's integrity is evaluated.
- The system checks token integrity as part of the authentication process.
- The device is then marked as either:
- Trusted — allowed access to the system
- Not trusted — denied access to the system