Set up Device Posture

Learn about the Device Posture requirements and instructions on how to enable it for the identity provider. This guide assumes that your network is secured and managed in Enterprise Application Access for Gov (EAA for Gov), and that applications, identify providers, directories, and connectors are already deployed.

Device Posture requirements

Prerequisites:

  • Administrator access to Enterprise Application Access for Gov (EAA for Gov) in ​Akamai Control Center​.

  • The Enterprise Application Access for Gov - Enterprise edition on your contract.

  • Users must be running the EAA Client in order for device signals to be collected by Enterprise Application Access for Gov.

📘

Note

If you’re using EAA Client 1.x.x, please refer to release note, Oct 15, 2020 — Enterprise Application Access, EAA Client for the upgrade to EAA Client 2.1.0 or later version and impact on akamai-device-id.

Enable Device Posture on an identity provider

Prerequisites:
The identity provider (IdP) you use with Enterprise Application Access for Gov (EAA for Gov) must have Device Posture and the EAA Client connector enabled.

If you have not already done so, add a new identity provider.

  1. In the Enterprise Center navigation menu, select Application Access > Identity & Users > Identity Providers.

  2. Select your identity provider to open it.

  3. In Settings > Client section.

  4. Select Enable EAA Client and Enable Device Posture.

  5. Click Save.

  6. Deploy the identity provider.

Next steps:
If you have not already done so, you need to configure at least one TCP-type or Tunnel-type client-access application in EAA for Gov:

  1. Add and configure a TCP-type client-access application or add and configure a tunnel-type client-access application.

  2. In Device Posture configure device risk assessments.

  3. Add the device posture tiers or tags as rules for your application. See Add access control rules to your application.