Device management facilitates the management of devices that are leveraged by users. From the security perspective that provides the possibility to identify these devices in the access layers on the basis of certificates. In other words: when a device can be identified it is easy to assign it a trust level. In the simplest form, a device with a certificate that is managed by the organization is trusted, and without a certificate means less or not trusted.