Delegated IdP overview

In most cases MobileIron Access is deployed as a proxy between the service provider (SP) and the identity provider (IdP). In such a deployment, all federated SP traffic goes through MobileIron Access. In some cases, you may want to retain the existing SP-IdP federated setup, but deploy MobileIron Access to federate a sub set of the traffic, such as traffic from mobile devices. In such cases, MobileIron Access can be deployed as a delegated IdP rather than as a proxy to the IdP. If MobileIron Access is deployed as a delegated IdP, the original IdP is seen as an SP by MobileIron Access.

Figure 1. Access as the IdP proxy

Figure 2. Access as the delegated IdP

Access can be deployed as the delegated IdP only for the following IdPs:

  • Idaptive
  • Microsoft ADFS
  • Okta
  • PingFederate

In an Access configured as a delegated IdP:

  • To authenticate managed devices, configure certificate single sign-on (SSO) in the MobileIron UEM.
  • To authenticate unmanaged devices, you have the option to enable Unmanaged Device Authentication in Access. If authentication for unmanaged devices is enabled, the unmanaged device is redirected to the original IdP for forms-based authentication.