探花大神 consolidates identity and access management (IAM) with unified endpoint management (UEM). This approach makes it possible to safeguard your most critical assets through a Zero Trust security strategy, all from one console. We鈥檙e rolling out enhancements that will enable IT admins to manage their digital estates with 探花大神, even if they use another identity provider (IdP). This is made possible by federating with upstream IdPs and key advancements to device management. We鈥檙e also introducing helpful new automations,聽 workflows, and troubleshooting tools that will improve IT鈥檚 overall efficiency.聽
探花大神 will soon be more flexible, secure, and user-friendly than ever before. Here鈥檚 the recap of what you missed if you didn鈥檛 tune into the Q4 product roadmap 2023 webinar.
Open Directory
探花大神 uniquely future-proofs your organization by connecting anything to everything and preventing vendor lock-in with open identity standards. We鈥檙e working on the 鈥渙pen鈥 in open directory with the addition of federation, as well as improving interfaces and connectors.
Active Directory Integration
Active Directory (AD) is still widely used on premises, and 探花大神 is embracing AD now and into the future. To date, we鈥檝e delivered powerful integration (bi-directional and password mastery) with the option to deploy agents on member servers in your deployments.
Active Directory Integration (ADI) helps admins to modernize AD while providing a path to fully adopt 探花大神 when the time is right. AD admins retain control while gaining the flexibility of a cloud identity.
Upcoming features include:
- Server 2022 support (EOY)
- AD credential use to access 探花大神 managed resources (2024)
Note: Even more directory connectors will be added in 2024.
Core Device Management
In Q4 (and beyond), 探花大神鈥檚 open directory platform will bring UEM to Okta users at scale. We鈥檙e also working to provide self-service provisioning, introduce a new device login screen experience for Macs and Windows PCs, and advance mobile device management (MDM).
Device as Gateway
Devices are gateways to our jobs. 探花大神 places managed users on managed devices. Today, admins can configure 探花大神 Go, a hardware-bound and phishing-resistant credential, to provide user-friendly passwordless authentication and end multi-factor authentication (MFA) fatigue. 探花大神 Go layers on technologies such as Windows Hello and Apple’s Face ID to provide secure access to privileged and/or standard line-of-business apps.
We鈥檙e making that experience even better:
- Step-up MFA will provide an extra layer of protection for privileged resources. Only managed users on managed devices will access the most privileged apps and data.
New Login Screens
We鈥檙e introducing a new login experience for 探花大神 managed users on Mac and Windows endpoints. Upcoming capabilities include:
- System diagnostics to troubleshoot issues at login that provides admins with details such as the MAC address, device serial number, and OS versions.
- Wi-Fi control for macOS makes it possible for admins to unlock a machine and change network settings.
- macOS does not support managing network connectivity from the login window
- The 探花大神 macOS login window has an user interface to 鈥淢anage Wi-Fi鈥
Self-Service Account Provisioning
We鈥檙e introducing a new account onboarding experience for device and identity management. Users will soon be able to 鈥淪ign In With 探花大神鈥 to auto provision and associate their 探花大神 account to their device with default account permissions. The 探花大神 agent will sync their 探花大神 password back to their device. Previously, admins had to pre-prepare devices and associate users with devices to activate their 探花大神 experience.
Other upcoming features include:
- The ability to take over an existing local Windows account
- Self-service password reset
Note: Scheduled user syncs from Google will eliminate manual processes when admins onboard users from Google Workspace into 探花大神.
Self-service provisioning is great for shared devices.
Open Directory Federation
探花大神 will create managed users on managed devices for upstream IdPs. It will soon be possible to use Okta credentials (and MFA) to provision users into 探花大神. Admins will proceed through the usual process of creating local users on devices with local credentials. Current customers may reach out to their account managers to enroll in the early access program.
Use Okta for device logins
Note: More IdPs are coming: Google, Azure, and Generic OIDC.
Easy Windows Enrollment
Earlier this year, 探花大神 streamlined how Windows devices that are already in the field are provisioned. We鈥檙e now focusing on enabling return-to-service workflows to enroll Windows endpoints through Provisioning Packages (PPKG) created with Windows Configuration Designer (WICD). Packages can be deployed using USB drives or network shares. Admins may also opt to partner with their OEM or contact 探花大神 partners like and to equip remote workers with the devices that they need to start getting work done.
Note: Self-service account provisioning is another great way to enroll new users to devices without having to ship them with a local admin configured ahead of time.
Custom App Repository
A custom app repository is in early access, and is expected to ship next year. 探花大神-hosted Windows MSI and Apple PKG files can be uploaded and delivered to assigned managed devices. This approach offers 探花大神 customers more assurance that packages haven鈥檛 been modified. Installers are validated through hash values for file integrity. 探花大神 will provide more visibility into installed apps on endpoints over time via app inventories.
Some of its features will include:
- Storage management and file transfer tracking [with GA]
- Uploading creates a 鈥榲ersion鈥 and triggers update [post GA]