Device identity for everything

Smallstep worked with Google at the IETF to develop a real standard for high-assurance device identity: ACME Device Attestation (ACME DA). ACME DA provides the strongest possible guarantee of authentic device identity by binding access to hardware- preventing credential exfiltration, phishing, and impersonation attacks.

Contact us
background graphic

Enforcing device identity is a mess

A diagram showing a device identity mess

Solve device identity for every use case

wifi icon

Device identity for Wi-Fi

Simple, secure certificate-based Wi-Fi using EAP-TLS

Icon of an application window with a shield on top

Device Identity for SaaS Apps

Protect resources by enforcing device identity in SSO flows

Global security icon

Device Identity for VPN & ZTNA

Enforce device identity when connecting to VPNs and proxies

Cloud icon

Device Identity for DevOps

Cert management for workloads & VMs

Fingerprint id

Device Identity for SSH

Extend single sign-on & device identity to SSH

A laptop with the Smallstep logo surrounded by a cluster of logos

A cross-platform architecture that simplifies everything

There’s no need to string together point solutions when one platform can do it all. Say goodbye to maintaining multiple tools just to cover more than one operating system.

Critical components of device identity

The building blocks of device identity

Achieving high-assurance device identity insists that four foundational components are in place. Smallstep simplifies the implementation of high-assurance device access by bridging the gap between security standards and operational reality. This leaves businesses with a modern and secure ecosystem to build on.

Learn more
Cover image of the white paper

Learn about the “Other Half” of identity

You could be missing half of Zero Trust. You have figured out user identity, but what about devices?

Download
background gradient
A linux laptop surrounded by a cluster of logos

Most MDMs don’t support Linux, but we do

Mobile Device Management tools (MDMs), like Intune for Windows or Jamf for Mac, are the orchestration layer that supports IT teams in managing large fleets of devices. Historically MDMs do not support Linux, often leaving Enterprise IT teams at a crossroads: should they allow engineers to use Linux even though doing so goes against basic security policies? Or rule out Linux entirely? Many companies find themselves in a game of limbo where no one wins.

Inventory list view UI

Learn more about the platform

The Smallstep platform helps mitigate numerous cybersecurity threats – from phishing to advanced hardware attacks – without impacting end-user workflows.

Learn more
gradient background

Leading the industry in Zero Trust for devices

Empower your teams to work at the pace and scale of modern engineering.

Contact us