Skip to main content

11 posts tagged with "Integrations"

View All Tags

· One min read
Desktop Application

We've released our new Desktop Application for macOS and Windows. This application will replace the web extension and provide a more seamless experience for users.

The XFA Desktop Application allows dekstop devices to communicate with the XFA service and serves as a critical tool for maintaining device compliance, managing multi-factor authentication (MFA), and controlling data sharing with organizations.

info

Note: Users can uninstall their browser extension, except for Brave users who should keep it installed.

More info.

· One min read

Discovery

You can now link your Okta account to XFA to discover all your devices and ensure compliance. XFA reads authentication logs and derives the devices used by each user from these logs. This will lead to a full overview of all discovered devices without verified information.

Get started in the XFA Dashboard under Discovery.

· One min read

Thoropass Integration

XFA is now a Thoropass Partner!

You can use XFA to provide device security proof automatically for your compliance needs, pushing updates regularly to Thoropass.

Get started in the Thoropass Dashboard > Under settings click on 'Integrations' > Find 'XFA' > click 'Learn more' > click 'Set Up Integration' > click 'New Connection' > you'll be redirected to XFA to confirm your integration.

· One min read

Discovery

You can now link your Google Workspace or Microsoft Entra ID account to XFA to discover all your devices and ensure compliance. XFA reads authentication logs and derives the devices used by each user from these logs. This will lead to a full overview of all discovered devices without verified information.

Get started in the XFA Dashboard under Discovery.

· One min read

Vanta Integration

You can export your devices to Vanta to provide device security proof automatically for your compliance needs.

Get started in the Vanta Dashboard under Integrations.

· One min read

XFA can be used as a factor through the BYO MFA functionality in OneLogin. This allows XFA to be seamlessly added to any application from within the OneLogin admin dashboard, given that it uses OneLogin as the identity provider.

When a user authenticates with OneLogin, as an additional factor after supplying a username & password, the user is redirected to XFA to verify that the device is compliant with the device security policy before authenticating the user. This assures that only devices that comply with the security policy are allowed access.

· One min read

XFA can be used as a factor through the External Authentication Methods functionality in Microsoft EntraID. This allows XFA to be seamlessly added to any application from within the Microsoft EntraID admin dashboard, given that it uses EntraID as the identity provider.

When a user authenticates with EntraID, as an additional factor after supplying a username & password, the user is redirected to XFA to verify that the device is compliant with the device security policy before authenticating the user. This assures that only devices that comply with the security policy are allowed access.

· One min read

Vanta Integration

XFA is now a Vanta Partner!

You can use XFA to provide device security proof automatically for your compliance needs, pushing updates regularly to Vanta.

Get started in the Vanta Dashboard under Integrations.

· One min read

Support for OAuth 2.0 PKCE

XFA now supports the OAuth 2.0 PKCE authentication method to integrate applications with XFA.

The integration works by replacing the redirectURL after authentication so users can verify their device security with XFA.

Available now through the XFA Dashboard!

· One min read

XFA Enforcement can be used as a possession factor through the idp-factor functionality in Okta. This allows XFA to be seamlessly added to any application from within the Okta admin dashboard, given that it uses Okta as the identity provider.

When a user authenticates with Okta, as an additional factor after supplying a username & password, the user is redirected to XFA to verify that the device is compliant with the device security policy before authenticating the user. This assures that only devices that comply with the security policy are allowed access.