Setup SSO with Trusted Devices
This document will walk you through adding SSO with trusted devices to your organization. You must be an organization owner or admin to complete these steps:
Open your organization and navigate to the Settings → Policies page.
On the Policies page, activate the following policies which are required for using trusted devices:
The Single organization policy.
The Require single sign-on authentication policy.
The Account recovery administration policy.
The Account recovery administration policy's Require new members to be enrolled automatically option.
If you do not activate these policies beforehand, they will be automatically activated when you activate the Trusted devices member decryption option. However, if any accounts do not have account recovery enabled, they will need to self-enroll before they can use admin approval for trusted devices. Users who enable account recoverymust log in at least once post-account recovery to fully complete the account recovery workflow.
Next, select the Trusted devices option in the Member decryption options section.
Once activated, users can begin decrypting their vaults with trusted device.
If your desired outcome is to have members without master passwords who can only used trusted devices, instruct users to select Log in → Enterprise SSO from the organization invite to initiate JIT provisioning. Admins/owners should still use the Create account option so that they have master passwords for redundancy and failover purposes.
Migration from SSO with trusted devices to other member decryption options is not currently recommended:
If for any reason your organization needs to switch its member decryption option back to master password from trusted device encryption, you must issue master passwords using account recovery to all users onboarded without them to preserve access to their accounts.
Moving from SSO with trusted devices to Key Connector is not supported.
Changing the member decryption option from Trusted devices to Master password without issuing master passwords will result in user account lockout. In order to make this policy change, you must:
Issue master passwords using account recovery.
Users must log in at least once post-account recovery in order to fully complete the workflow and prevent lockout.
If the member decryption option was changed without issuing master password, the following three options remain for users:
Follow the delete-recover workflow.
Restore account from an account/organization backup.
Create a new account or organization.