Set up Device Posture

Learn about the Device Posture requirements and instructions on how to enable it for the identity provider. This guide assumes that your network is secured and managed in Enterprise Application Access (EAA), and that applications, identify providers, directories, and connectors are already deployed.

Device Posture requirements


  • Administrator access to Enterprise Application Access (EAA) in ‚ÄčAkamai Control Center‚Äč.

  • The Enterprise Application Access - Enterprise edition on your contract.

  • Users must be running the EAA Client in order for device signals to be collected by Enterprise Application Access.



If you‚Äôre using EAA Client 1.x.x, please refer to release note, Oct 15, 2020 ‚ÄĒ Enterprise Application Access, EAA Client for the upgrade to EAA Client 2.1.0 or later version and impact on akamai-device-id.

Enable Device Posture on an identity provider

The identity provider (IdP) you use with Enterprise Application Access (EAA) must have Device Posture and the EAA Client connector enabled.

If you have not already done so, add a new identity provider.

  1. In the Enterprise Center navigation menu, select Application Access > Identity & Users > Identity Providers.

  2. Select your identity provider to open it.

  3. In Settings > Client section.

  4. Select Enable EAA Client and Enable Device Posture.

  5. Click Save.

  6. Deploy the identity provider.

Next steps:
If you have not already done so, you need to configure at least one TCP-type or Tunnel-type client-access application in EAA:

  1. Add and configure a TCP-type client-access application or add and configure a tunnel-type client-access application.

  2. In Device Posture configure device risk assessments.

  3. Add the device posture tiers or tags as rules for your application. See Add access control rules to your application.