Device Identity

Device identity is a digital representation of a physical or virtual hardware device — laptop, server, phone, IoT sensor — that allows the device itself to be authenticated and authorized as a security principal, separate from the user operating it.

⚙️ How Does It Work?

Devices are enrolled in MDM/EMM platforms (Microsoft Intune, Jamf) and receive certificates or device IDs. Zero Trust policies evaluate device health (compliant, managed, patched) alongside user identity before granting access.

📍 Where Is It Used?

Zero Trust architectures, enterprise endpoint management, BYOD policies, IoT security, any environment where device trustworthiness affects access decisions.

💡 Real-World Example

A company's Conditional Access policy requires both valid user identity AND device compliance before allowing access to sensitive apps. An employee tries to access Salesforce from her personal, unmanaged laptop — denied. From her Intune-managed work laptop — allowed.

🔗 Related Terms

Zero Trust Conditional Access Non-Human Identity MDM Endpoint Security

Stay Ahead in Identity Security

Get weekly IAM, PAM & IGA insights via Identity Pulse.

Subscribe to Identity Pulse →
Scroll to top