Extend Okta Risk Engine Signals to the Network
Display Icon

Cultivating Device Trust with Azure + SecureW2

Apply Azure identity context directly to network access control with certificate-based authentication. Auto-remediate when suspicious behavior or account compromise occurs.

With SecureW2 empowering your Azure domain, you’ll gain greatly enhanced network security that is built for user-friendliness. This integration ensures that all Azure users are validated during certificate enrollment, managed devices are compliant, and network segments are created based on roles, enhancing security and efficiency..

Enterprise SSO with Zero Trust Guest & Contractor Onboarding Device Trust Access Control

How This Improves Your Security

Azure-Driven Network Access

Network policies that automatically adapt to Azure user status, group changes, and risk signals in real-time.

Continuous Device Trust

Combine Azure user trust with hardware-bound certificates to verify device posture, compliance, and legitimacy.

Go Passwordless

Replace frustrating MFA prompts and eliminate the risk of credential theft for Wi-Fi, VPN, Okta SSO, Desktop Login, and more.

Top Use Cases

SAML Certificate Enrollment for Azure Users

Enable self-service, certificate-based access for unmanaged devices using Azure SAML SSO.

View Documentation
How it works
  • 1 User downloads Self-Service Onboarding Client from JoinNow Landing Page
  • 2 Client redirects the user to Azure SSO to enter credentials
  • 3 Credentials are verified, SAML token with user attributes sent to JoinNow Client
  • 4 Certificate is issued and installed with network settings; device is ready for Wi-Fi
Overview
  • Passwordless, certificate-based Wi-Fi for unmanaged/BYOD devices
  • Role-based access using Azure groups and attributes
  • Faster, self-service onboarding with minimal IT effort
  • Reduced risk of credential theft and spoofed networks
Automate Network Access & Segmentation via Azure Signals

Implement dynamic access controls based on Azure user attributes with SecureW2’s Cloud RADIUS.

View Documentation
How it works
  • 1 Devices present certificates to the Cloud RADIUS server, initiating authentication
  • 2 SecureW2 uses real-time lookups to verify users’ status through Azure
  • 3 Access decisions are driven by user roles and groups within Azure
  • 4 Policies ensure users are placed in the correct VLAN or access group based on current directory information
Overview
  • Ensures only authorized and active users have network access
  • Reduce risk by assigning VLAN segmentation based on real-time user status
  • Reduce the need for manual oversight and automate network access
  • Combine Azure user status with device trust from Intune, CrowdStrike, and more.

Frequently Asked Questions

How long does it take to set up the Azure integration?

The complete integration with Azure can be configured in 10-15 minutes using our guided setup wizard. This process includes setting up the SAML application, configuring your Azure AD settings, and establishing initial certificate policies.

Can I customize which Azure attributes are included in certificates?

Yes, you have full control over attribute mapping in the integration. You can include standard Azure attributes like department, job title, and groups, as well as custom attributes defined in your Azure Active Directory.

How does certificate revocation work with Azure?

When a user is deactivated or removed from roles within Azure, SecureW2 automatically revokes their certificates through real-time updates and webhook notifications, maintaining secure certificate management.

Does the integration support automated certificate enrollment?

Yes, the SecureW2 and Azure integration supports automated certificate enrollment. Users can easily enroll for certificates through a self-service portal, streamlining the process and reducing the administrative burden. This ensures that users have secure access to network resources without manual intervention.

Is the integration SOC 2 compliant?

Yes, both SecureW2 and Azure maintain SOC 2 compliance. The integration utilizes industry-standard protocols, such as SAML, SCIM, and OIDC, with encrypted communication throughout the entire process.

Can this integration support multi-tenant environments?

Yes, the SecureW2 and Azure integration supports multi-tenant deployments with isolated certificate policies for each tenant. Every tenant can have independent Azure configurations and manage their certificate policies separately.

Ready to Activate Azure Integration with SecureW2?

Connect with our integration specialists to implement this solution in your environment and transform your security posture.