Managed, Registered, and Unregistered Devices (2024)

  • Motivation
    • Registered and Unregistered Devices
  • Manage Registered and Unregistered Devices
    • Organization-level settings
    • Service-level settings
      • Create role
      • Create policy
    • View Total Unregistered Devices
    • Registered and Unregistered Device Directory

Motivation

Google’s BeyondCorp security model promotes the concept of a “Managed Device,” which is a device that is procured and actively managed by the enterprise. In Google’s BeyondCorp, only managed devices can access corporate applications. A device tracking and procurement process revolving around a device inventory database is one cornerstone of this model.

Similarly, SonicWall Cloud Secure Edge (CSE) espouses a security model where corporate applications should only be accessed by Registered Devices.

Registered and Unregistered Devices

Registered Devices are desktops (macOS, Windows, Linux) and mobile devices (iOS, Android) that have a Trusted Device Certificate in their keychain.

Unregistered Devices are desktop and mobile devices that do not have a Trusted Device certificate in their keychain.

A device can obtain a Trusted Device Certificate by:

  • Installing the CSE desktop app to register the device
  • Installing a Trust Device Certificate via a Device Manager

Managed, Registered, and Unregistered Devices (1)

Manage Registered and Unregistered Devices

By default, SonicWall Cloud Secure Edge (formerly Banyan’s) TrustProvider component only responds to Registered devices. If a device is unregistered and attempts to make a TLS connection, CSE drops the connection and the device cannot access CSE-secured applications and services.

However, in some scenarios (such as incremental rollout of the desktop app or exposing certain services to Unregistered devices), you need to relax the Device Certificate requirement to allow access to Unregistered devices.

Registered and Unregistered device access is managed in the Command Center, both at the organization level and at the service level.

Additionally, the Command Center lists your organization’s unregistered devices on the and displays a count of them on the Reporting page.

Organization-level settings

At the most general level, you can create a policy for your entire organization.

An organization-level policy is applied to all apps and services configured for your organization, and may be superseded by policies set at the service level.

To configure organization-level settings:

  1. Log in to your instance of the Command Center.

  2. Navigate to Settings > TrustProvider Settings > Unregistered Devices.

Managed, Registered, and Unregistered Devices (2)

The Allow Unregistered Devices to Access Services section lets Unregistered Devices access CSE-secured service, as long it has an IP address in the inputted CIDR range. Connections from these CIDR ranges will be accepted and forwarded to the Identity Provider for user authentication. The generated Trust Token will not have any device claims, meaning it cannot be associated with a specific device.

Managed, Registered, and Unregistered Devices (3)

The Allow Unregistered Devices to Receive an HTTP Response section allows you to customize either a:

  • 401 Unauthorized error message.
  • 302 Redirect URL to a custom URL.

As long the Unregistered device has an IP address in the inputted CIDR range, it will receive an HTTP status code and a custom message presented to the device user (such as “Please install the desktop app and register your device” or redirect them to the configured redirect URL.

Service-level settings

If you have configured Allow Unregistered Devices to Access Services for your organization, you can configure service-level settings to grant only Registered devices access to individual apps and services. You simply create a role that only applies to Registered devices. Then, you apply that role to specific apps and services so that only Registered devices are granted access.

Create role

To create a role that only applies to Registered devices:

  1. Log in to your instance of the Command Center.

  2. Navigate to Secure Access > Roles and then click + Add Role.

Managed, Registered, and Unregistered Devices (5)

  1. Select User Role.

Managed, Registered, and Unregistered Devices (6)

  1. Enter a Role Name and Description.
  1. Click + Add Role Attribute and then select By Device Registration.
  1. Click Add Role.

Managed, Registered, and Unregistered Devices (7)

Create policy

To create a policy that allows access only to Registered devices:

  1. Navigate to Secure Access > Policies and then click + Create Policy.

Managed, Registered, and Unregistered Devices (8)

  1. Select the Basic Authorization Policy for Users template.

Managed, Registered, and Unregistered Devices (9)

  1. Configure the applicable fields and then select the Registered Devices role created in step 6 above.

If a Policy is configured with a Trust Level (e.g., High, Medium, AlwaysDeny), it will automatically block all Unregistered Devices (because CSE cannot compute a Trust Level for those devices) regardless of the Org-level or Service-level Settings.

  1. Select Create Policy.

Now, only devices having a Trusted Device Certificate should be able to access the service.

View Total Unregistered Devices

The Reporting page shows a high-level breakdown of unregistered devices. Under the Devices tile, click Unregistered to dig deeper into unregistered devices in your directory.

This only appears if the organization has an Unregistered Devices allowed at the Organization level.

Managed, Registered, and Unregistered Devices (10)

Registered and Unregistered Device Directory

View a complete list of unregistered devices and their associated users in the Command Center by navigating to Directory & Infrastructure > Devices > Unregistered Devices.

Managed, Registered, and Unregistered Devices (11)

Can’t find what you’re looking for?

We’re happy to help. Contact our team.

Managed, Registered, and Unregistered Devices (2024)
Top Articles
Other tips
Instant Card Withdrawals | Visa direct,Card Withdrawals
Antisis City/Antisis City Gym
This website is unavailable in your location. – WSB-TV Channel 2 - Atlanta
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Angela Babicz Leak
Instructional Resources
Valley Fair Tickets Costco
Aadya Bazaar
Voorraad - Foodtrailers
Gabriel Kuhn Y Daniel Perry Video
Ingles Weekly Ad Lilburn Ga
craigslist: south coast jobs, apartments, for sale, services, community, and events
Naturalization Ceremonies Can I Pick Up Citizenship Certificate Before Ceremony
What's New on Hulu in October 2023
B67 Bus Time
Voyeuragency
Cooktopcove Com
Elizabethtown Mesothelioma Legal Question
Sivir Urf Runes
Are They Not Beautiful Wowhead
Cashtapp Atm Near Me
Mzinchaleft
Bing Chilling Words Romanized
Hermitcraft Texture Pack
Epguides Strange New Worlds
Xsensual Portland
Sullivan County Image Mate
What Is The Lineup For Nascar Race Today
Kingdom Tattoo Ithaca Mi
Craigslist Dubuque Iowa Pets
Jackie Knust Wendel
Culver's.comsummerofsmiles
Delta Township Bsa
Umn Biology
Florence Y'alls Standings
2487872771
Salons Open Near Me Today
Appleton Post Crescent Today's Obituaries
Mississippi State baseball vs Virginia score, highlights: Bulldogs crumble in the ninth, season ends in NCAA regional
Elisabeth Shue breaks silence about her top-secret 'Cobra Kai' appearance
Citibank Branch Locations In Orlando Florida
Lake Kingdom Moon 31
The best specialist spirits store | Spirituosengalerie Stuttgart
4k Movie, Streaming, Blu-Ray Disc, and Home Theater Product Reviews & News
Gon Deer Forum
Conan Exiles Colored Crystal
Suppress Spell Damage Poe
Rétrospective 2023 : une année culturelle de renaissances et de mutations
Lsreg Att
91 East Freeway Accident Today 2022
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6580

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.