Security

Device Pairing

Token-based device registration

Every device must be explicitly enrolled with a single-use token before it can send data. No device can self-register — admins control every machine in the fleet.

Single-use

per-device tokens

Instant

revocation

1-click

installer deploy

Devices — 3 enrolled

Alex's MacBook Pro

macOS ARM

Active

Today

Sarah's Windows PC

Windows 11

Active

Mar 28

Jordan's Ubuntu

Linux

Active

Mar 15

Pending token

Not enrolled

Unused

dge_a7f3... · John's Laptop · Expires Apr 30Download installer →

What you get

Everything built into the platform — no plugins, no integrations, no configuration required.

Enrollment tokens

Admin creates a per-device token, downloads a pre-configured installer — employee just runs it. No codes, no emails.

Single-use tokens

Each token is consumed on first use. If a token is leaked before use, it can be revoked instantly.

Device identity

Registered devices get a unique secret. Compromised credentials can be revoked without re-enrolling the whole org.

Fleet visibility

See every enrolled device, its last seen time, platform, and registration status from the Devices page.

Ready to try Device Pairing?

Start your 14-day free trial. No card required. Full access to every feature.