Bell's retail fleet is 80% unmanaged devices. Existing Arcot machine registration uses a proprietary WebSocket model incompatible with Okta. There is no scalable mechanism to distribute Bell CA certificates to unmanaged endpoints — which is required to activate Okta Userless Device Signal (UDS).
A "Pull" model where authenticated Store Managers download and install Bell-signed X.509 certificates via a web portal. SDOP acts as a Registration Authority, orchestrating PKI issuance, Okta Verify binding, and lifecycle state — without requiring MDM.
Established by Okta via OIDC Authorization Code flow. MFA and risk-based controls enforced. Identifier format: dealerid.userid. SDOP never authenticates users directly.
Established by SDOP + Okta UDS. Requires valid Bell certificate + OS trust + Okta Verify binding + registry ACTIVE state. All four signals must be present.
Enforced by SiteMinder + InfoNet. Evaluated dynamically per request using current entitlements. Never embedded in certificates or tokens.
Device inactivity · Dealer termination · Lost/stolen report · Security investigation · Policy violation · Certificate expiration · Explicit admin action
Automated revocations near real-time. Manual revocations executed immediately. Revocation always results in denial of downstream access. Certificate state is subordinate to device lifecycle state.
Extending Arcot to support CA certificate distribution and OS-level trust would require introducing a new device bootstrap, installer delivery, lifecycle, and recovery framework within a legacy component not designed for this purpose — duplicating Okta functionality and fragmenting device trust ownership.
Arcot's security intent is fully preserved: dealer-scoped device trust, entity isolation, and cryptographic device identity. SDOP replaces static hardware-derived identifiers with registry-enforced, lifecycle-managed equivalent boundaries.