Desktop Password Sync meets Platform SSO 2.0 and Jamf Pro

April 2025: Additional app identifier required for the associated domain entry on macOS 15 Sequoia

Introduction

Support for Platform SSO 2.0 is available for macOS computers using Sonoma (14.0) and later.
Platform SSO 2.0 allows Desktop Password Sync to be used directly from the
macOS login window.
In this blog, I will briefly describe the configuration steps required to use Okta Device Access with Platform SSO 2.0

Prerequisites

Before you start ensure that you meet these requirements:

  • Your Okta Identity Engine org is available.
  • Okta Desktop Password Sync is configured, all configuration steps are describe in the following blog post.
  • Your computers are running macOS Sonoma (14.0) or later, so you can implement Platform SSO 2.0.
  • Okta Verify 9.19 deployed to your macOS devices
  • You have an Jamf Pro environment ready with the necessary permissions

Set up Device Access SCEP certificates

Device Access SCEP certificates are required to use Desktop Password Sync on devices running macOS Sonoma (14.0) and later.
These certificates deploy with your Jamf Pro environment, and are used to grant access to specific API endpoints and to identify the device making the calls.

Configure Okta as a CA for Device Access

In this blog I am covering how to configure Okta as a CA with dynamic SCEP.
In the Okta Admin Console, open Security –> Device Integrations 

Click the Device Access tab and click on the Add SCEP configuration.

Select Generic as the Dynamic SCEP URL type and press the Generate button.

Copy the following values, as you need them in a later step, while creating the SCEP profile in your Jamf Pro environment.

  1. SCEP URL
  2. Challenge URL
  3. Username
  4. Password
  5. Save your settings.

Create a dynamic SCEP profile in Jamf Pro

In Jamf Pro console , go to Computers –> Configuration Profiles and click New to create the new profile.

On the General page, enter the following information:

  1. A name for the profile.
  2. Optional. Enter a description of the profile.
  3. Select the appropriate level for the certificate.
    Okta Verify uses this certificate to identify managed devices and managed users.
    To ensure that all users of the device are managed, you should select Computer Level.

Click SCEP, and then click Configure.

For the SCEP profile, enter the following information:

  1. Paste the SCEP URL that you copied from the Okta admin console in the previous step
  2. Enter a name for the SCEP profile
  3. Choose a time frame for the profile to be redistributed when its SCEP-issused certificate is the specified number of days from expiring.
    Okta doesn’t support automatic certificate renewal.
    The profile must be redistributed to replace the expired certificate.
  4. Enter an appropriate subject name. For example, if you selected Computer Level, set the subject to indicate the device name e.g.
    CN=$COMPUTERNAME ODA $UDID
  1. Select Dynamic-Microsoft CA
  2. Enter the Challenge URL hat you copied from the Okta admin console in the previous step
  3. Enter the username
  4. Enter the password
  5. Re-enter the password
  1. As Key Size select 2048
  2. Select Use as digital signature
  3. Deselect Allow export from keychain
  4. Select Allow all apps access
  5. Save your settings

Now we need to configure the targets that the profile will be deployed to, navigate to the Scope menu:

  1. Select your Target Computers
  2. Select your Target Users
  3. Save your settings

Verify that the Okta CA was installed on your devices

Open Keychain Access on your device

to verify that a client certificate and associated private key exists.

Update your MDM profiles

Using Platform Single Sign-On 2.0 with Okta Desktop Password Sync requires you to make some configuration changes to your existing device management profiles.

  1. com.okta.mobile-auth-service-extension profile
  2. single sign-on extension profile

Update your device management profile

Log in to your Jamf Pro environment and locate the device management profile for the com.okta.mobile-auth-service-extension domain.

Edit the profile and add the following:
<key>PlatformSSO.ProtocolVersion</key>
<string>2.0</string>

If you create a new profile you can use this template, please change it to your
Okta URL and your Client ID.

<plist version="1.0">
   <dict>
   <key>OktaVerify.OrgUrl</key>
   <string>https://replace-with-your-org-URL</string>
   <key>OktaVerify.UserPrincipalName</key>
   <string>$USERNAME</string>
   <key>OktaVerify.PasswordSyncClientID</key>
   <string>replace-with-your-client-ID</string>
   <key>PlatformSSO.ProtocolVersion</key>
   <string>2.0</string>
   </dict>
</plist>

Update your single sign-on extension profile

The next step is to update your existing single sign-on extension profile.
Navigate to the Single-Sign-On Extension payload and set the Use Shared Device Keys setting to Enabled.

Save your profile and push it to your devices.

After Shared Device Keys has been enabled, users receive a notification asking them to update their registration.
This will take the user through the Desktop Password Sync registration process to sync their Okta password to their macOS account.

Let’s take a look at this in the following demo:

  1. Admin updates the device management profiles in Jamf Pro
  2. Desktop Password Sync registration process starts again

Demo Password Sync on macOS lock screen

This demo shows the Password Sync functionality on macOS lock screen.

Demo Password Sync on macOS login screen

This demo shows the Password Sync functionality on macOS login screen.


One thought on “Desktop Password Sync meets Platform SSO 2.0 and Jamf Pro

  1. We currently have Desktop Password Sync in production with users on Ventura and Sonoma. Will this negatively affect users on Ventura if we deploy the new Platform SSO 2.0 configs to the Macs with Ventura? What will users on Ventura experience if these new settings are pushed out?

Leave a Reply