Device Trust

Last modified on March 8, 2024


Device Trust is a security mode that enables your organization to configure StrongDM to work with endpoint management software, such as CrowdStrike and SentinelOne.

When running in Device Trust mode, the StrongDM client provides signals on the host machine’s Device Trust status when evaluating policies that require it. The information that is provided to the policy evaluation indicates whether the machine hosting the client has an endpoint agent running and if it has flagged any vulnerabilities. If any of these conditions are violated, the client can be logged out and any active resource connections are severed.

StrongDM admins can enable Device Trust for all users, including service accounts. Moreover, admins can specify users and roles to be excluded from Device Trust enforcement. This page describes how to set up Device Trust in the Admin UI.


  • Enablement requires that your organization have software from a supported Device Trust provider running on user workstations.
  • You must have administrative access to your organization’s Device Trust provider account.
  • You must enact Policies that use Device Trust as a condition of access in order to trigger Device Trust checks.

Admin UI Configuration

  1. In the Admin UI, go to Settings > Security.
  2. Under Device Trust, click the lock to change the settings.
  3. For Enable Device Trust for Your Organization?, select Enabled to enable it. Then click Save.
  4. For Default User Enforcement you can choose whether you wish for users to have Device Trust enforced on them by default, or to be exempt by default.
  5. Consider which user(s) and/or role(s), if any, that you want to be excluded from Device Trust enforcement. Before fully activating Device Trust, you can make exceptions for specific users and roles so that Device Trust is enforced for all users and roles except the ones you exclude. To make an exception for a user, go to the user’s Settings tab and check the relevant option for Device Trust Enforcement. To make an exception for a role, go to the role’s Settings tab.
  6. Go back to Settings > Security > Device Trust to configure the remaining settings.
  7. For Provider, choose your endpoint management software provider (for example, CrowdStrike or SentinelOne).
  8. Complete the remaining settings for your selected provider. In these settings, “agent” refers to the endpoint agent that is installed on the user’s workstation. The agent monitors the user workstation’s posture and assesses whether the given workstation is in a positive or negative integrity state.
  9. Allow service accounts to run without the agent allows you to exempt service account machines that are not enrolled with your Device Trust provider.
  10. Save when you’re done.

Device Trust providers


Base URLRequiredCrowdStrike base address (for example,
Client IDRequiredCrowdStrike client ID
Client SecretRequiredCrowdStrike client secret
Member CIDOptionalCrowdStrike customer identification (CID), which is found on the sensor download page of the CrowdStrike Console
ProviderRequiredSelect CrowdStrike
ScoreRequiredNumeric value, from 1 to 100, that indicates the security posture for the host

The minimum scopes required when creating your CrowdStrike credentials are:

  • Hosts (Read)
  • Zero Trust Assessment (Read)


API TokenRequiredSentinelOne API token, which can be generated in the SentinelOne management console in the user settings
Management URLRequiredSentinelOne Management URL (for example,
ProviderRequiredSelect SentinelOne

SentinelOne API calls require authentication, and SentinelOne’s recommended authentication is API token (that is, ApiToken). Your SentinelOne credentials need to have view permissions for the app(s) you want to monitor. API tokens are generated in the SentinelOne Management Console or your API request, and each token is valid for six months. Because of this expiration, you must rotate/regenerate your API token every six months, if SentinelOne is your Device Trust provider type. You can see your token’s expiration date when viewing your user account in the SentinelOne Management Console.

For information, please refer to SentinelOne API documentation.

User Administration

Particular users can have a Device Trust setting that is explicit and independent of the organization-wide controls. The values available when editing a user’s profile are:

  • Default: Device Trust is enforced for this user if the organization’s global settings require Device Trust to be enforced.
  • Exempt: Device Trust is not enforced for this user, regardless of global settings.
  • Required: Device Trust is enforced for this user, regardless of global settings.

User Experience

When Device Trust is enabled, administrators can use policies to check the device status of any users with it enabled. This check can then be used to validate whether their device posture as reported by the agent is still good. If their device posture is not acceptable, the policies can force further actions such as MFA re-authentication, request to log the user’s reasons for particular actions, or forcibly log out the user.

If the user is using the CLI and is forcibly logged out, all connections are severed.