Enrollment Single Sign-on (SSO)
-  Use up/down arrow keys to navigate, Esc to collapse.
 - Last UpdatedJun 24, 2025
 - 3 minute read
 
Environments with a Bring Your Own Device (BYOD) program using supported identity providers can configure an Enrollment single sign-on (SSO) workflow to enhance the account-driven User Enrollment experience.
With Enrollment SSO, the account-driven User Enrollment experience now includes the installation of an authentication app, which will facilitate enrollment into Jamf Pro. Once the user is enrolled in Jamf Pro, the authentication app remains installed as a managed app to provide additional authentications.
Enrollment SSO with Jamf Pro currently only supports Okta.
You must have the following to configure Enrollment SSO:
Mobile devices with iOS 16 or iPadOS 16 or later
Single Sign-On Authentication enabled in Jamf Pro
Account-driven User Enrollment configured in Jamf Pro. For details, see Device Enrollment for Mobile Devices.
Enable for personally owned devices enabled for account-driven User Enrollment, with Enrollment Method set to User Enrollment. For details, see Enabling User Enrollment for Mobile Devices in Jamf Pro.
Using Okta Verify as an Enrollment SSO app with Jamf Pro requires the configuration of multiple items within Jamf Pro, including Single Sign-On settings, a managed app configuration for the Okta Verify app, and a configuration profile with a Single Sign-on Extension payload configured.
Okta as an identity provider
- Okta FastPass authentication enabled for your Jamf Pro app in the Okta dashboard. For details, see Okta FastPass from Okta.
 
End users will be guided to set up and register within the Okta Verify app if they select the Sign in with Okta FastPass option when authenticating with Jamf Pro during enrollment. If the user signs in to Okta without selecting Okta FastPass, the Okta Verify app can be set up by the user later, after the device enrolls with Jamf Pro.
You may encounter errors if Okta Verify is already installed on end user devices when attempting to deploy Enrollment SSO. If you do, follow these steps to remediate:
On the end user device, open the Okta Verify app and manually delete any existing accounts. Then, delete the Okta Verify app. Navigate to and attempt the Enrollment SSO workflow again. Okta Verify should re-install automatically, and you can re-add the removed accounts.