Skip to main content

Device Join Modalities

The following table outlines how devices behave in each join type — including how they authenticate, how they are managed, and their access to cloud and on-premises resources.
FeatureAD JoinedHybrid JoinedEntra ID Joined
AuthenticationUses Kerberos authentication exclusively within the on-premises environment.Supports both Kerberos (for on-prem resources) and Microsoft Entra ID authentication (for cloud resources).Uses Microsoft Entra ID authentication only, leveraging modern protocols like OAuth 2.0, OpenID Connect, and SAML.
ManagementFully managed via Group Policy Objects (GPOs) from on-premises Active Directory.Managed by Group Policy for on-premises settings and Mobile Device Management (MDM) such as Intune for cloud policies.Managed exclusively through Intune or another MDM solution, with policy enforcement from the cloud.
On-Prem ResourcesFull and native access to internal resources such as file shares, printers, and intranet applications.Full access to on-premises resources through Kerberos, as the device maintains a local AD trust.Limited or no native access; access requires VPN, proxy, or conditional access connectors.
Cloud ResourcesMinimal or no direct access to Microsoft Entra cloud resources unless explicitly configured.Full access to Microsoft Entra-protected cloud resources such as Microsoft 365, Teams, and OneDrive.Full and direct access to all Microsoft Entra-protected cloud applications and resources.
Internet DependencyNo dependency on internet connectivity for authentication; fully functional within corporate network.Moderate internet dependency for synchronization with Microsoft Entra ID and MDM policy updates.High dependency on internet connectivity for authentication and device compliance checks.
Ideal forOn-premises organizations with minimal cloud integration or strict internal control requirements.Hybrid EnvironmentsCloud-first or fully remote organizations that operate primarily using Microsoft Entra ID.

TruU Authentication Modalities

TruU supports two primary authentication modalities that can be applied across all device join types — FIDO2 (Virtual FIDO Key) and Smartcard / Certificate-Based Authentication (Virtual Smartcard). Each serves a distinct purpose, depending on your organization’s identity architecture and compliance standards.
TruU AspectFIDO2 (virtual FIDO key)Smartcard Cert-Based Auth (virtual smartcard)
PurposeProvides a passwordless and phishing-resistant authentication experience that eliminates the need for passwords while ensuring strong cryptographic validation.Secure, certificate-based authentication using smartcards or tokens.
TechnologyBased on Public Key Cryptography using open standards — WebAuthn (Web Authentication API) and CTAP (Client to Authenticator Protocol).X.509 certificates stored on smartcards
StandardsOpen, global standard developed and maintained by the FIDO Alliance. Supported across Windows, macOS, iOS, Android, and major browsers.PKI (Public Key Infrastructure)
AuthenticationRelies on public/private key pairs generated on a FIDO2 authenticator (e.g., USB key, biometrics)Relies on public / private key pair generated on certificates stored on a smartcard or token
StoragePrivate keys are stored securely in hardware-backed storage (such as TPM, Secure Enclave, or FIDO2 security key).Certificates and private keys are stored on the smartcard/TPM
Device join typeSupported on Hybrid Joined and Entra ID Joined (Cloud) devices.Hybrid Azure joined, AD joined, mac
RevocationNo traditional certificate revocation process; authentication trust is tied directly to the registered FIDO authenticator. If the authenticator is removed, access is revoked automatically.Certificates can be revoked via CRLs
SetupEasy to deploy at scale — does not require PKI or certificate issuance infrastructure. Can be rolled out via Intune or MDM with minimal user setup.Requires PKI infrastructure, certificate management
TruU’s support for both FIDO2 and Smartcard-based authentication ensures compatibility with diverse enterprise environments. Organizations can adopt passwordless authentication at their own pace, aligning with existing infrastructure and compliance goals.
WA Configuration Options AD (Domain Joined) - CBA