The Toktra agent runs on macOS, Windows, and Linux. This page covers deploying agents silently at scale across a managed fleet. For a single-machine install, see the Quickstart.Documentation Index
Fetch the complete documentation index at: https://docs.toktra.dev/llms.txt
Use this file to discover all available pages before exploring further.
Deployment overview
Deploying Toktra involves two things:- Pushing the agent package — the installer or package that puts the agent binary on the device.
- Pre-approving system components — on macOS, the Network Extension requires MDM pre-approval to install silently. On Windows, the WFP driver requires elevation. Linux packages handle this through the package manager.
macOS — Kandji or Jamf
The macOS agent requires a Network Extension, which macOS blocks from installing without user interaction unless an MDM profile pre-approves it.Build and notarize the package
Download the Toktra
.pkg installer from Settings → Downloads in the dashboard, or build it from source if your security policy requires it. The package must be notarized with a valid Apple Developer ID before deployment.Push the MDM configuration profile
Upload
com.toktra.agent.mobileconfig to your MDM and push it to the target device group. This profile pre-approves the com.toktra.agent.extension Network Extension for the Toktra team ID, preventing the user prompt.Replace TOKTRA_TEAM_ID in the profile with your Apple Developer Team ID before uploading.- Kandji
- Jamf Pro
In Kandji, go to Library → Add → Custom Profile, upload the
.mobileconfig file, and assign it to the relevant blueprint.Deploy the package silently
After the profile is applied, deploy the
.pkg installer via your MDM’s software deployment feature. The installer runs silently without user prompts.- Kandji
- Jamf Pro
In Kandji, add a Custom App under Library, upload the
.pkg, and assign it to the blueprint. Set the install type to Install Automatically.The macOS agent also ships a LaunchDaemon plist (
com.toktra.agent.plist) and a watchdog plist (com.toktra.watchdog.plist). These are included in the .pkg installer and are installed automatically to keep the agent running after reboots.Windows — Intune or SCCM
The Windows agent ships as an MSI package. It installs a WFP callout driver, a Windows Service, and the Edge browser extension. The driver installation requires administrator privileges.Obtain the MSI
Download the Toktra MSI from Settings → Downloads in the dashboard. The installer is built with WiX v4 and is signed with a Sectigo EV certificate.
Deploy via Intune or SCCM
- Microsoft Intune
- SCCM / ConfigMgr
In Intune, go to Apps → Windows apps → Add, select Line-of-business app, and upload the Assign the app to the relevant device group. Intune deploys it silently on the next sync.
.msi. Set the install command:Linux — package manager
The Linux agent ships as.deb and .rpm packages. It runs as a systemd service and uses eBPF for socket-level monitoring. Linux kernel 5.10 or later with BTF support is required.
Install the agent
- Debian/Ubuntu
- RHEL/CentOS/Fedora
toktra-agent systemd service automatically.Enrollment overview
When a Toktra agent starts for the first time on a new device, it:- Generates an Ed25519 key pair on the device.
- Submits a Certificate Signing Request (CSR) to the Toktra enrollment endpoint.
- Receives a signed X.509 device certificate from Toktra’s intermediate CA. The certificate is valid for 90 days.
- Uses that certificate for mutual TLS on all subsequent connections to Toktra.
Where are device certificates stored?
Where are device certificates stored?
On macOS, device certificates are stored in the system Keychain under the Toktra agent’s entitlement. On Windows, they are stored in the Windows Certificate Store (not the filesystem). On Linux, they are stored at
/etc/toktra/certs/.What happens if enrollment fails?
What happens if enrollment fails?
The agent retries enrollment with exponential backoff. Check that the device has outbound HTTPS access to
ingest.toktra.io. On macOS, also verify that the Network Extension is approved in System Settings → Privacy & Security → Extensions.Can I pre-provision certificates for zero-touch enrollment?
Can I pre-provision certificates for zero-touch enrollment?
Yes. Contact your Toktra account team to configure pre-provisioned certificates for environments where devices cannot reach the enrollment endpoint during initial setup.