Device identity is a digital representation of a physical or virtual hardware device — laptop, server, phone, IoT sensor — that allows the device itself to be authenticated and authorized as a security principal, separate from the user operating it.
⚙️ How Does It Work?
Devices are enrolled in MDM/EMM platforms (Microsoft Intune, Jamf) and receive certificates or device IDs. Zero Trust policies evaluate device health (compliant, managed, patched) alongside user identity before granting access.
📍 Where Is It Used?
Zero Trust architectures, enterprise endpoint management, BYOD policies, IoT security, any environment where device trustworthiness affects access decisions.
💡 Real-World Example
🔗 Related Terms
Stay Ahead in Identity Security
Get weekly IAM, PAM & IGA insights via Identity Pulse.
Subscribe to Identity Pulse →