Delegated IdP overview
In most cases MobileIron Access is deployed as a proxy between the service provider (SP) and the identity provider (IdP). In such a deployment, all federated SP traffic goes through MobileIron Access. In some cases, you may want to retain the existing SP-IdP federated setup, but deploy MobileIron Access to federate a sub set of the traffic, such as traffic from mobile devices. In such cases, MobileIron Access can be deployed as a delegated IdP rather than as a proxy to the IdP. If MobileIron Access is deployed as a delegated IdP, the original IdP is seen as an SP by MobileIron Access.
Figure 1. Access as the IdP proxy
Figure 2. Access as the delegated IdP
Access can be deployed as the delegated IdP only for the following IdPs:
- Idaptive
- Microsoft ADFS
- Okta
- PingFederate
In an Access configured as a delegated IdP:
- To authenticate managed devices, configure certificate single sign-on (SSO) in the MobileIron UEM.
- To authenticate unmanaged devices, you have the option to enable Unmanaged Device Authentication in Access. If authentication for unmanaged devices is enabled, the unmanaged device is redirected to the original IdP for forms-based authentication.