Difference between revisions of "Jamf Pro"

From Studentnet Wiki
Jump to navigation Jump to search
Line 5: Line 5:
 
#:'''Name''' = '''JAMFPro'''
 
#:'''Name''' = '''JAMFPro'''
 
#:'''Entity ID''':
 
#:'''Entity ID''':
#:* If using JAMF OnPemise, use for Entity ID: https://jamfinstance.domain.com:8443/saml/metadata
+
#:* If using JAMF OnPremise, use for Entity ID: https://jamfinstance.domain.com:8443/saml/metadata
 
#:* If using Jamfcloud hosted server, use for Entity ID: https://instance.jamfcloud.com/saml/metadata
 
#:* If using Jamfcloud hosted server, use for Entity ID: https://instance.jamfcloud.com/saml/metadata
 
#:'''ACS''':
 
#:'''ACS''':
#:* If using JAMF OnPemise, use for ACS: https://jamfinstance.domain.com:8443/saml/SSO
+
#:* If using JAMF OnPremise, use for ACS: https://jamfinstance.domain.com:8443/saml/SSO
 
#:* If using Jamfcloud hosted server, use for ACS: https://instance.jamfcloud.com/saml/SSO
 
#:* If using Jamfcloud hosted server, use for ACS: https://instance.jamfcloud.com/saml/SSO
 
#:'''Single Logout Service''' = Leave blank
 
#:'''Single Logout Service''' = Leave blank
Line 14: Line 14:
 
#:'''NameID Format''' = select from drop down '''urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress'''
 
#:'''NameID Format''' = select from drop down '''urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress'''
 
#:'''Login URL''':
 
#:'''Login URL''':
#:* If using JAMF OnPemise, use for Login URL: https://jamfinstance.domain.com:8443
+
#:* If using JAMF OnPremise, use for Login URL: https://jamfinstance.domain.com:8443
 
#:* If using Jamfcloud hosted server, use for Login URL: https://instance.jamfcloud.com
 
#:* If using Jamfcloud hosted server, use for Login URL: https://instance.jamfcloud.com
 
#Click '''Submit'''
 
#Click '''Submit'''
Line 28: Line 28:
 
#:'''Other Provider''' = Enter in '''Cloudwork'''
 
#:'''Other Provider''' = Enter in '''Cloudwork'''
 
#:'''Entity ID''':  
 
#:'''Entity ID''':  
#:* If using JAMF OnPemise, use for Entity ID: https://jamfinstance.domain.com:8443/saml/metadata
+
#:* If using JAMF OnPremise, use for Entity ID: https://jamfinstance.domain.com:8443/saml/metadata
 
#:* If using Jamfcloud hosted server, use for Entity ID: https://instance.jamfcloud.com/saml/metadata
 
#:* If using Jamfcloud hosted server, use for Entity ID: https://instance.jamfcloud.com/saml/metadata
 
#:'''Identity Provider Metadata Source''' = select '''Metadata File'''
 
#:'''Identity Provider Metadata Source''' = select '''Metadata File'''

Revision as of 03:17, 23 August 2022

Single Sign On with Cloudwork

  1. Login to Cloudwork dashboard
  2. Navigate to Single Sign On>Add New Service>Custom SAML Service
  3. Fill out the form:
    Name = JAMFPro
    Entity ID:
    ACS:
    Single Logout Service = Leave blank
    NameID Value = From the drop down select Email
    NameID Format = select from drop down urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
    Login URL:
  4. Click Submit
  5. Under XML File click download and save file as .XML file

Single Sign On with JAMF Pro

  1. Login to your JAMF Pro dashboard
  2. In the top right corner click the gear
  3. Under System Settings click on Single Sign On
  4. In the bottom left corner click Edit and turn on Single Sign-On Authentication
  5. Fill out the form:
    Identity Provider = Other
    Other Provider = Enter in Cloudwork
    Entity ID:
    Identity Provider Metadata Source = select Metadata File
    Upload Metadata File = Upload the XML File which was downloaded from Cloudwork Dashboard.
    Token Expiration Time Override = Leave at 480
    Identity Provider User Mapping = Set to NameID
    Jamf Pro User Mapping = Set to Email
    Identity Provider Group Attribute Name = Set to https://scopes.cloudwork.id/profile
    Options: Select the following options
    • Single Sign-On Options for Jamf Pro
    • Allow users to bypass the Single Sign-On authentication (Optional Choice)
    • Enable Single Sign-On for Self Service for macOS
    • Enable Single Sign-On for User-Initiated Enrollment
    • Enrollment Access = Set to Any Identity provider user

Testing