With 1Password Device Trust (Kolide) and Microsoft Entra ID , you can make sure every device is known, secure, and compliant before it can access company applications, and empower your team to remediate their own device health issues with step-by-step instructions.
With this integration, you can:
- Import your Microsoft Entra users and groups.
- Protect the Kolide admin dashboard with Entra authentication.
- Allow your users to sign in to Device Trust-protected apps with their Google credentials.
Before you begin
Before you can set up Kolide and Entra ID, you’ll need:
- A Microsoft Entra plan with a P1 license or higher.
- Access permissions in Entra ID
for the following roles:
- Application Administrator
- Authentication Administrator
- Authentication Policy Administrator
- Conditional Access Administrator
- Groups Administrator
The Kolide and Entra ID implementation doesn’t fully support:
- Guest-user logins
- Cross-tenant users (requires that multi-factor authentication claims for cross-tenant users are trusted)
- External authentication methods for Azure Government Cloud (limited to certain Azure Gov instances)
Important
Known limitation
Depending on your Entra configuration, end users may see multiple authentication options when signing in, which could allow them to bypass Kolide by selecting another method of multi-factor authentication.
These steps were recorded in February 2024 and may have changed since. Refer to the Microsoft Entra ID documentation for the most up-to-date steps.
Step 1: Configure the external authentication method
Step 1.1: Create a 1Password Device Trust enabled group in Entra ID for testing
To test the implementation and make sure it works the way you want it to, first create a 1Password Extended Access Management-enabled group with test users.
- Open two browser windows side-by-side. In one window, sign in to Kolide.
- In the second window, sign in to Entra ID .
- In Entra ID, select Groups in the sidebar, then select New group.
- Fill out the fields, including:
- Group type: Select Security.
- Group name: Enter the name “1Password Device Trust Enabled”.
- Group description: Enter a description of the group. For example: “1Password Extended Access Management Device Trust Enabled Users”.
- Membership type: Choose Assigned.
- Owners: Choose your group owners.
- Members: Choose your test users.
- Select Create.
Step 1.2: Set up an App Registration and External Authentication Method for 1Password Device Trust
Copy and paste the Tenant ID
- In Entra ID, find your organization’s Tenant ID. Select Microsoft Entra ID Directory at the top of the page, then choose Overview in the sidebar.
- Copy the Tenant ID.
- In Kolide, select your profile in the top-right corner of the page, then select Settings and choose Identity Providers in the sidebar.
- Select the Set Up button for Microsoft Entra, then select Set Up Authenticator.
- Paste the Tenant ID you copied in step 2 into the field and select Discover OIDC Metadata. The information will populate into Kolide.
Register the application in Entra ID
- In Entra ID, select Manage > App registrations in the sidebar.
- Select New registration.
- Enter the name “1Password Device Trust Auth” and select Web from the “Select a platform” dropdown.
- In Kolide, copy the Kolide Auth URI and paste it into the Redirect URI field in Entra ID.
- In Entra ID, select Register to create the application.
Add Application Redirect URIs
- After you’ve successfully created the application, in Entra ID select Manage > Authentication in the sidebar.
- In Kolide, copy the Issuer URI and paste it into the second Redirect URIs field in Entra ID.
- Select Add URI again in the Web section of the page in Entra ID.
- In Kolide, copy the Authorization URL and paste it into the third Redirect URIs field in Entra ID.
- In Entra ID, select Save at the bottom of the page to update the application.
Add an external authentication method in Entra ID
- In Entra ID, select Overview in the sidebar.
- In the Essentials section, copy the Application (client) ID.
- Select Microsoft Entra ID Directory at the top of the page, then select Security in the sidebar.
- Choose Manage in the sidebar, then select Authentication methods.
- Select Add external method, then paste the Application (client) ID you copied in step 2 into the App ID field.
- Enter a name for the external authentication method, like “1Password Device Trust”. This name cannot be changed later, and it’s the name your team will see when they choose a multi-factor authentication method.
- In Kolide, copy the Client ID and paste it into the Client ID field in Entra ID.
- In Kolide, copy the Discovery URL and paste it into the Discovery Endpoint field in Entra ID.
- In Entra ID, select Request permission. You’ll see a message that says “Admin consent granted” once the permission request goes through.
You may be asked to sign in again and accept the permissions request.
Add targets
- After admin consent is granted, toggle on Enable in the “Enable and target” section.
- Select Add Target in the “Enable and target” section, then select Add Target and choose Select Targets in the dropdown.
- Find and select the checkbox for the “1Password Device Trust Enabled” group in the list, then choose Select at the bottom of the page.
- Select Save at the bottom of the page.
- Close the “Saving external authentication method” notification, then select X in the top-right corner of the “Authentication methods | Policies” overlay to close it.
- In Kolide, select Update Settings.
Step 2: Configure SAML SSO for 1Password Device Trust
Create a new Enterprise Application in Entra ID
- In Entra ID, select Microsoft Entra ID Directory at the top of the page, then select Manage > Enterprise applications in the sidebar.
- Select New application, then select Create your own application.
- Enter “1Password Device Trust SSO” for the name of the app.
- Select Integrate any other application you don’t find in the gallery (Non-gallery), then select Create.
Assign the 1Password Device Trust Enabled group
- In Entra ID, select Manage > Users and groups in the sidebar.
- Select Add user/group.
- Choose None Selected.
- Find and select the checkbox next to the 1Password Device Trust Enabled group, then choose Select at the bottom of the page.
- Select Assign at the bottom of the page.
Add single sign-on
- In Entra ID, select Manage > Single sign-on in the sidebar.
- Select the SAML box to set up single sign-on with SAML.
Add the Entity ID
- In Entra ID, select Edit within the Basic SAML Configuration box.
- In the Identifier (Entity ID) section, select Add identifier.
- In Kolide, choose Set Up Single Sign-On Provider.
- In Kolide, copy the Kolide Entity ID, then paste it into the Enter an identifier field in Entra ID.
- In the Identifier (Entity ID) section, select Add identifier a second time.
- Paste the Kolide Entity ID into the second Enter an identifier field in Entra ID, then change the “app” part of the Kolide Entity ID to “auth”. For example:
- https://app.kolide.com/
- https://auth.kolide.com/
Add the Reply URL
- In Entra ID, select Add reply URL in the Reply URL (Assertion Consumer Service URL) section.
- In Kolide, copy the Kolide ACS URL and paste it into the Enter a reply URL field in Entra ID.
- In Entra ID, select Add reply URL in the Reply URL (Assertion Consumer Service URL) section a second time.
- Paste the Kolide ACS URL into the second Enter a reply URL field in Entra ID, then change the “app” part of the Kolide ACS URL to “auth”. For example:
- https://app.kolide.com/
- https://auth.kolide.com/
- In Entra ID, select Save at the top of the page, then select X in the top-right to close the Basic SAML Configuration overlay.
- Select No, I’ll test later in the “Test single sign-on with 1Password Device Trust SSO” notification.
Configure 1Password Device Trust SSO to link with Entra ID
- In Entra ID, at the bottom of the page in the “Set up 1Password Device Trust SSO” box, copy the Login URL. Paste it into the Provider SSO URL field in Kolide.
- In Entra ID, select Download next to Certificate (Base64) in the SAML Certificates box.
- Drag and drop the certificate or copy and paste the contents into the Provider X.509 Certificate box in Kolide.
- In Kolide, select Save Settings.
Step 3: Configure SCIM provisioning for 1Password Device Trust
Set up provisioning
- In Entra ID, choose Provisioning in the sidebar, then select Connect your application.
- Enter your tenant URL (the URL of your SCIM connection with Kolide): https://app.kolide.com/scim/v2
- In Kolide, choose Set Up User Provisioning.
- In Kolide, select Generate Authorization Bearer Token and copy the generated token.
- Paste the bearer token into the Secret Token field in Entra ID.
- We recommend saving the bearer token in your 1Password account. If you ever lose your token, you can regenerate it from your SCIM Provisioning page in the Identity Providers section in Kolide.
- Select Test Connection, then select Create and wait a moment for the connection to be created.
- In Kolide, select I’ve Saved the Token, Finish Set Up.
Map attributes
- In Entra ID, select Attribute mapping in the sidebar.
- Select Provision Microsoft Entra ID Users.
- Find the
emails[type eq "work"].value
attribute in thecustomappsso
column and choose Edit. - Change the source attribute from
mail
touserPrincipalName
.If you choose a different Entra ID source attribute, make sure to update the
customappsso
username attribute to use the same source attribute. - Find the
objectID
attribute in thecustomappsso
column and choose Edit. - Change the source attribute from
mailNickname
toexternalID
. - Select Ok.
- Select Save then choose X in the top right.
- Select X in the top-right corner of the Attribute Mapping overlay to close it, then select X in the top-right corner of the Provisioning overlay to close it as well.
Start provisioning
- In Entra ID, select Start Provisioning.
- In Kolide, select the vertical ellipsis icon , then choose Make Primary.
Optionally, you can provision on demand. Entra ID runs full provisioning cycles every 40 minutes. To bypass the full cycle:
- Select Provision on demand.
- Find and select the 1Password Device Trust Enabled group.
- Select View all users.
- Choose the users you want to provision on demand.
Step 4: Create a Conditional Access policy
- In Entra ID, select Microsoft Entra ID Directory at the top of the page, then select Security > Conditional Access in the sidebar.
- Select Create new policy, then enter “Require 1Password Device Trust (Kolide)” for the name, or a name that meets your internal naming conventions.
- In the Users section, select 0 users and groups selected, then choose Select users and groups and select the checkbox next to Users and groups.
- Find and select your 1Password Device Trust Enabled group and choose Select.
- In the Target resources section, select No target resources selected, then open the Select what this policy applies to dropdown and select Resources (formerly ‘Cloud apps’).
- Choose Select apps, then select None under Select.
- Find and select your 1Password Device Trust SSO app and choose Select.
- In the Grant section, select 0 controls selected, then select the checkbox next to Require multifactor authentication and choose Select.
- In the Session section, select 0 controls selected, then select the checkbox next to Sign-in frequency. Choose Periodic reauthentication and enter “8” and select the dropddown and choose Hours. Then choose Select.
- In the Enable Policy section, select On.
This makes sure that team members are prompted with the Kolide Device Trust verification step.
- Select Create.
As an optional step, you can choose which apps you’d like to include or exclude. To do this, change the Target resources section. Select All resources (formerly ‘All cloud apps’), or add additional selected apps in the Select section. We recommend you limit your selected apps so you can control which users and apps are using 1Password Device Trust.
The next time a user in your 1Password Device Trust Enabled group signs in to the SSO-controlled resource, Kolide will check the health of their device if they select 1Password Device Trust in their multifactor authentication prompt. If the user passes the device health checks you’ve set up in Kolide, they’ll be able to sign in without taking additional steps. If they fail a check, Kolide will show them how to resolve the issue. After the user has fixed the issues with their device, Kolide will perform an instant recheck so they can sign in.
Step 5: Test Device Trust Sign-in
To test the Device Trust sign-in process from the perspective of your team:
- Sign in as a user that belongs to your 1Password Device Trust Enabled group.
- As an optional step, pre-install the Kolide agent to simulate pushing the agent out to your devices. This is optional because the user will be prompted to install the agent if it is not present.
- In Kolide, select Downloads in the sidebar.
- Download the installer for your operating system and follow the on-screen instructions through to the success message.
- In the task bar, you’ll see a Kolide icon that appears for about 60 seconds.
- In a new private browser window, go to https://app.kolide.com, or go to any other application included in your new Conditional Access policy to sign in.
A private browser window makes sure the existing session is not cached.
- Sign in with your Microsoft credentials using your username and password without entering a Microsoft Authenticator or other authentication code. Then select I can’t use my Microsoft Authenticator app right now.
- Select Approve with 1Password Device Trust to redirect to Kolide and validate that the Kolide agent is installed.
If the agent was pre-installed on the end-user device, it will register the device. If the agent is not installed, the user will be prompted to download and install the agent before the new device can be registered.
To see how Kolide handles failed checks, first set up device health checks for your team. Then:
- In Kolide, choose the Devices tab and select your device to see if there are any failing checks.
- Select Details on a check that is straightforward to fix, like File Extensions Are Not Visible in Finder.
- Select Actions > Edit Check Settings.
- In the Remediation Strategy section, select Configure.
- Choose Block Immediately and select Save.
- In a new private browser window, go to https://app.kolide.com, or any other application included in your new Conditional Access policy.
- Sign in with your Microsoft credentials using your username and password. However, don’t enter a Microsoft Authenticator or software authenticator code. Then select I can’t use my Microsoft Authenticator app right now.
- Select Approve with 1Password Device Trust to redirect to Kolide. You should be blocked by Kolide based on the check you changed earlier.
- Select Fix this issue, which opens a new table that shows you how to fix the issue.
- Fix the issue, then return to the Kolide window and select I’ve fixed it. Recheck now.
Kolide will run a real-time check to validate that the issue has been fixed before completing the sign-in flow.
If you want to test the sign-in process with additional users, add them to the 1Password Device Trust Enabled group. When you’re ready to roll out Device Trust more widely, add everyone you want to use Device Trust to the group. Anyone who belongs to the group can use the new sign-in flow.
Advanced setup: Make sure users can’t bypass Device Trust
To make sure users can’t bypass Device Trust, exclude the 1Password Device Trust Enabled group from registration campaigns and other authentication methods.
Some users with Microsoft Administrator roles will still be able to register additional multi-factor authentication methods.
Exclude your 1Password Device Trust Enabled group from registration campaigns
- In Entra ID, select Security in the sidebar.
- Choose Manage in the sidebar, then select Authentication methods.
- Choose Manage > Registration campaign in the sidebar.
- Select Edit next to Settings.
- Select Add users and groups.
- Find and select your 1Password Device Trust Enabled group and choose Select at the bottom of the page.
- Select Save next to settings.
Exclude your 1Password Device Trust Enabled group from other authentication methods
Update your Authentication Method Policies to exclude the Device Trust group from other authentication methods. For example, to make sure the 1Password Device Trust Enabled group can’t use Microsoft Authenticator:
- In Entra ID, select Policies in the sidebar.
- Select Microsoft Authenticator in the Authentication Method Policies section.
- Select Exclude, then select Add groups.
- Find and select your 1Password Device Trust Enabled group and choose Select at the bottom of the page.
- Select I Acknowledge, then select Save.
- Repeat this process with any other authentication methods you don’t want the group to use.
If you see an error after excluding your 1Password Device Trust Enabled group from Microsoft Authenticator, follow these steps to remove the other authentication methods or remove the methods for SSPR.
Remove other existing authentication methods
You can remove other existing authentication methods within Entra ID, with PowerShell, or by sharing instructions with your users on how they can remove the authentication methods themselves.
To remove a user’s existing additional authentication methods in Entra ID:
- In Entra ID, select Monitoring > User registration details in the sidebar while still in the Authentication methods section.
- Find and select the name of the user you want to remove authentication methods from.
- Select Authentication methods in the sidebar.
- For the Default sign-in method, select the edit button next to the Microsoft Authenticator notification.
- From the Select default sign in method dropdown, choose SMS (primary mobile), then select Save at the bottom of the page.
- Select the vertical ellipses for Microsoft Authenticator, then select Delete.
- Select Yes for the “Are you sure you want to delete this Microsoft Authenticator?” notification.
- Delete the “Phone number” authentication method and any additional authentication methods, like the “Software OATH token”.
After you delete the other authentication methods, the default sign-in method is “No default”, which makes Kolide the default method.
To remove users' existing additional authentication methods with PowerShell:
- Get a list of the users in your 1Password Device Trust Enabled group.
- Parse the list of users with PowerShell and remove the additional authentication methods.
To let users remove existing additional authentication methods themselves, share the following instructions with them:
- Go to the My Account page for Microsoft: https://myaccount.microsoft.com/
- If you’re already logged in to a Microsoft website, select your avatar in the top-right corner and choose View account.
- Select Security info in the sidebar.
- Select Delete next to the authentication methods other than the password method.
If you use self-service password resets
If your tenant uses self-service password resets (SSPR), you’ll need to change the number of factors for SSPR, or at a minimum remove the verified phone number and authenticator app methods for SSPR. This leaves only email address and security questions as trusted password reset methods.
To remove the verified phone number and authenticator app methods:
- In Entra ID, select Microsoft Entra ID Directory at the top of the page, then select Manage > Password reset in the sidebar.
- Select Manage > Authentication methods in the sidebar.
- Uncheck Mobile app notification, Mobile app code, Mobile phone, and Office phone.
- Select Save.
Remove administrative self-service password reset
Sign in to your account on the Microsoft Azure portal.
Select the Cloud Shell icon in the top-right corner and make sure you’re using PowerShell.
- If you don’t have access to the Azure Cloud Shell, you’ll need to install the Microsoft AD PowerShell Module on your local system. Then connect to Entra using the
Connect-AzAccount
command.
- If you don’t have access to the Azure Cloud Shell, you’ll need to install the Microsoft AD PowerShell Module on your local system. Then connect to Entra using the
Run the following command to read and modify authorization policies:
connect-MgGraph -Scopes "Policy.ReadWrite.Authorization"
Follow the instructions output by the command to authorize your PowerShell for Microsoft Graph and grant consent.
Run the following command to update the authorization policy in Microsoft Graph and remove the ability for users to use the SSPR:
Update-MgPolicyAuthorizationPolicy -AllowedToUseSspr:$false
The change takes about 60 minutes to take effect. You can verify when it’s taken effect on the Password Reset | Administrator Policy page in the Entra portal.
Get help
If you need to generate a new bearer token
You can generate a new bearer token for SCIM provisioning at any time by following the instructions in Step 3.
If you can’t authenticate with SAML
After configuring the integration, if you get an error that says Could not authenticate you via SAML
when you try to authenticate with Device Trust, you’ll need to re-download the SAML certificate in Entra ID that you downloaded in Step 2:
- In Kolide, select your profile, then select Settings and choose Identity Providers in the sidebar.
- Select Microsoft Entra, then choose Set Up Single Sign On Provider.
- In Entra ID, select Manage > Enterprise applications in the sidebar.
- Choose your Device Trust application in the list.
- Select Manage > Single sign-on.
- Choose SAML, then select Download next to Certificate (Base64) in the SAML Certificates box.
- Drag and drop the certificate or copy and paste the contents into the Provider X.509 Certificate box in Kolide.
- In Kolide, select Save Settings.
If you’d like to upload the Kolide logo to your Enterprise Application
If you’d like to add the Kolide logo to your app:
- In Entra ID, select Manage > Enterprise applications in the sidebar.
- Choose your Device Trust application in the list.
- Select Manage > Properties.
- Download the Kolide logo.
- Choose Select a file and upload the Kolide logo.
- Select Save.