Skip to main content
Version: Next Gen

Overview

Jamf Pro is a device management solution for Apple devices within organizations. With Beyond Identity, administrators can restrict access using conditional access policies.

Control device access

The list below shows additional example access management with Jamf Pro and Beyond Identity.

  • Ownership types of mobile devices
  • Supervision status of devices
  • User-approved mobile device management

View the 🔵 Jamf policy attributes table for more.

Prerequisites

To get started with the integration, view the following prerequisites.

Jamf prerequisites

This information contains the requirements for integrating with Beyond Identity.

  • Jamf Pro tenant with valid values
    • Username
    • Password
  • Tenant URL
    • Must be in this formatting: https://\{YOUR_JAMF_TENANT_NAME\}.jamfcloud.com

Operating system compatibility

The Jamf integration currently supports macOS and iOS only. The list below describes all platform compatibility.

  • Windows - ❌ Not Supported
  • macOS - ✅ Fully Supported
  • Linux - ❌ Not Supported
  • iOS - ✅ Fully Supported
  • Android - ❌ Not Supported

Steps

Follow the steps in the sections below to complete your integration for Beyond Identity and Jamf.

Legend

The sections below use these two color codings to identify the steps for separate platforms. Use a separate browser window when following instructions for each platform.

🔵 Beyond Identity - Beyond Identity platform tasks are highlighted in blue.

🟠 Jamf - Jamf Pro platform tasks are highlighted in orange.


🟠 Set up initial Jamf Pro environment

This section describes setting up the 🟠 Jamf Pro environment for the first time. If you already have a Jamf environment configured, go directly to Configure Jamf Pro to integrate with Beyond Identity.

Click here to view the steps.

Set up the Jamf Pro environment

  1. Access the Jamf Pro environment by logging in to the following link as an administrator: https://yourinstancename.jamfcloud.com Replace "yourinstancename" with the name of your Jamf Pro instance. Login using your Jamf Pro admin username and password.
  2. Create additional users, if required. To create additional users, follow these steps: https://docs.jamf.com/10.28.0/jamf-pro/administrator-guide/Jamf_Pro_User_Accounts_and_Groups.html
  3. Integrate with a third-party identity provider (IdP) to enable single sign-on (SSO) for portions of Jamf Pro. When SSO is configured and enabled, users are automatically redirected to your organization's IdP login page. After authentication, users obtain access to the resource they were attempting to access. To configure SAML, follow these steps: https://docs.jamf.com/10.28.0/jamf-pro/administrator-guide/Single_Sign-On.html

Prepare for Computer and Device Enrollment

Apple Push Notification Certificate

Creation of an APNs certificate is required for enrollment of iOS devices and macOS devices. This certificate enables secure communication between Jamf Pro and Apple's servers which support and enable MDM protocols, such as automated deployment of apps, configuration profiles and remote commands.

.

Configure User-initiated Enrollment Settings

While the majority of customer (production) environments utilize Automated enrollment using Apple Business Manager, for the demo environment, you can configure User-initiated enrollment.

Before enrolling devices, the server must be configured to support user-initiated enrollment. Follow the steps below to enable enrollment of both iOS and macOS devices.

  1. Login to Jamf Pro.
  2. In the top-right corner of the page, click *Settings.
  3. Click User-Initiated Enrollment.
  4. Click Edit.
  5. (Optional) Customize the default settings for the General and Messaging tabs as needed.
  6. Click Platforms and from the macOS tab, check the box to Enable user-initiated enrollment for computers.
  7. Enter any username for the administrative account that will be associated with the managed device in the Username field.
  8. Note: Although required, the configuration of this field is only relevant for the use of the Jamf Remote application.

  9. Click the iOS tab and check the box for Enable user-initiated enrollment for institutionally owned iOS devices and personally owned iOS devices.
  10. Click Save in the bottom-right corner of the page. Your environment is now configured to allow users to enroll devices without the use of Apple Business Manager.


Enroll Computers

  1. On the test device you intend to deploy the app to, navigate to https://yourInstanceName.jamfcloud.com/enroll
  2. Enter the credentials for the account used to log into Jamf Pro on the Login screen, and then click Log in.
  3. Click Enroll without entering anything in the text box on the Assign to user screen.
  4. Important: Entering data into the text box will prevent enrollment if no LDAP servers are configured (none are by default).

  5. When prompted, click Continue. This will download a file “CA Certificate.mobileconfig” on your Mac.
  6. Click the file “CA Certificate.mobileconfig”.
  7. Go to Mac System Preferences > Profiles. You will see the CA Certificate listed there.
  8. Click Install.
  9. Click Install again. The CA Certificate is now installed.
  10. When prompted, click Continue to download the “enrollmentProfile.mobileconfig” on your Mac.
  11. Click the file “enrollmentProfile.mobileconfig”.
  12. Go to Mac System Preferences > Profiles. You will see the MDM Profile listed there.
  13. Click Install.
  14. Click Install again.
  15. The MDM Profile is now installed. After the MDM profile has been installed, jamf binary, agents and other management tools will automatically begin installing in the background, please allow a few minutes for this process to complete before attempting to perform management tasks on the device.

  16. Quit the browser to ensure all Jamf Pro sessions are closed.

  17. More information and screenshots of the end user experience can be found in the Jamf Pro Administrator's Guide at the following link: https://www.jamf.com/resources/product-documentation/jamf-pro-administrators-guide


Enroll Mobile Devices

  1. On the test device you intend to deploy the app to, navigate to https://yourInstanceName.jamfcloud.com/enroll.
  2. On the Login screen, enter the credentials for the account used to login to Jamf Pro, then tap Log in.
  3. When prompted to choose between a Personally Owned or an Institutionally Owned device, tap Personally Owned and then tap Enroll.
  4. Tap Continue when prompted to install the CA certificate.
  5. Tap Allow when prompted to download the configuration profile.
  6. Tap Close and then close the browser.
  7. Open the Settings app on the device and tap General > Profiles.
  8. Tap the CA Certificate, and then tap Install in the top-right corner.
  9. Follow the on-screen prompts to complete the installation process.
  10. Note: If a warning prompts about the authenticity of the MDM Profile, tap Install. This is expected when Jamf Pro is configured to skip certificate installation during enrollment.


More information and screenshots of the end-user experience can be found in the Jamf Pro Administrator's Guide at the following link:

https://www.jamf.com/resources/product-documentation/jamf-pro-administrators-guide/

🟠 Configure Jamf Pro to integrate with Beyond Identity

If you already have Jamf Pro configured, start here to begin the configuration with Beyond Identity.

  1. Log into the Jamf Pro Admin Console.

  2. Go to All Settings → Jamf Pro User Accounts & Groups → New → Create Standard Account.

  3. Click Next.

  4. Under the Account tab, fill in the following information:

    OptionEnter or Select
    Usernamebi-api-user
    Privilege SetCustom
    Access StatusCustom
    Full NameAPI User
    Email Addressyour_email_address
    Passwordyour_password
    Passwordyour_password
    Verify Passwordyour_password
    Force user to change password at next loginLeave unchecked

    Note: The Username and Password are required for configuring Beyond Identity.

  5. Under the Privileges tab, fill in the following information

    1. Click Jamf Pro Server Objects.
    2. Select READ permissions for all.
    3. Leave other permissions unchecked.
  6. Click Save.

🔵 Configure Beyond Identity

After configuring Jamf, add the integration using the 🔵 Beyond Identity console.

  1. On your Beyond Identity Secure Access console home page under PLATFORM, navigate to Integrations.
  2. Under Integrations, click Browse Integrations.
  3. Click Jamf.
  4. On the Jamf page, click the Add instance button.
  5. On the Add integration pop up under General, input your information for the Display Name* field. This is required.
  6. Under the Configure API for Jamf section, paste the values from your Jamf Pro platform of Step 4 in the previous section. Each of these values is required.
    • Base URL*
    • Username*
    • Password*
  7. Click Save Changes. This prompts the successfully added pop up and returns you to the integration page.

🟠 Push Beyond Identity Platform Authenticator to mobile devices

Leveraging Jamf mobile attributes in the Beyond Identity policy and determining managed states requires the Beyond Identity Platform Authenticator to be pushed to managed mobile devices. These must have the following specific app configuration.

  1. Navigate to Devices → Mobile Device Apps → + New.
  2. Click App Store app or apps purchased in volume.
  3. Search for and add the Beyond Identity mobile application.
  4. On the New Mobile Device App page, go to App Configuration and input the items below.
serialNumber: $SERIALNUMBER
DeviceUid: $UDID
JamfProID: $JSSID
  1. Click Save.

🔵 Test MDM authentication policy

  1. Login to the Beyond Identity Admin console from a computer that is enrolled in Jamf Pro.
  2. On a computer that is not enrolled in Jamf Pro, begin logging into Beyond Identity.
  3. Confirm that the policy behavior is as expected.
  4. Click Events in the navigation bar to confirm the correct rule is triggered.

🔵 Jamf policy attributes

With this integration, you can create policies to allow or deny authentication using Beyond Identity. The attributes in the table below are available by default.

AttributeTypeUsageDescription
Connection AvailablebooleanpolicyChecks whether the connection to CrowdStrike is available.
Computer Serial NumberstringpolicySerial number of the computer.
Computer Managed by JamfbooleanpolicyVerifies that the computer is managed by Jamf.
Computer is SupervisedbooleanpolicyVerifies that the computer is supervised. Supervision gives your organization more control over the devices you own, allowing restrictions such as disabling AirDrop or Apple Music, or placing the device in Single App Mode. It also provides additional device configurations and features, so you can do things like silently install apps and filter web usage using a global proxy, to ensure that users' web traffic stays within the organization's guidelines.
MDM CapablebooleanpolicyVerifies whether the computer has the MDM profile installed.
User Approved MDMbooleanpolicyVerifies that Jamf management has been approved by the user. User approved MDM (UAMDM) grants mobile device management (MDM) software additional privileges beyond what is allowed for macOS MDM enrollments that have not been user approved.
Boot Partition Filevault StateenumpolicyFileVault state of the macOS boot partition.
Computer ModelstringpolicyModel of the computer.
Processor ArchitecturestringpolicyArchitecture of the processor on the computer.
Computer MAC AddressstringpolicyMAC address of the computer.
OS Filevault StatusenumpolicyFileVault state of the macOS OS partition.
SIP StatusenumpolicyDescribes the status of System Integrity Protection (SIP).
Gatekeeper StatusenumpolicyDescribes the Gatekeeper state.
Automatic Login DisabledbooleanpolicyVerifies that Automatic Login is disabled.
Remote Desktop EnabledbooleanpolicyVerifies that Remote Desktop is enabled.
Activation Lock EnabledbooleanpolicyVerifies that Activation Lock is enabled. With Activation Lock, the Apple ID password or device passcode is required before anyone can turn off Find My, erase your Mac, or reactivate and use your Mac.
Secure Boot LevelenumpolicyDescribes the Secure Boot state of the computer.
External Boot LevelenumpolicyDescribes the External Boot configuration.
Recovery Lock EnabledbooleanpolicyVerifies that a password is required to enter recovery mode.
Application Level Firewall EnabledbooleanpolicyVerifies that the Application Level Firewall (ALF) is enabled.
Computer UsernamestringpolicyUsername of the user assigned to the computer in Jamf.
Device TypestringpolicyDevice type, e.g. iOS.
Mobile Device Managed by JamfbooleanpolicyVerifies that the mobile device is managed by Jamf.
Software Update Device IDstringpolicySoftware update device ID.
Mobile Device IP AddressstringpolicyLast identified public IP address of the mobile device.
Mobile Device is SupervisedbooleanpolicyVerifies that the mobile device is supervised. Provides additional control and configuration options for organizational devices.
Device Ownership TypestringpolicyDescribes the ownership type of the mobile device.
UDIDstringpolicyUnique device identifier for the mobile device.
Mobile Device Serial NumberstringpolicyThe serial number of the mobile device.
Mobile Device ModelstringpolicyModel of the mobile device.
Mobile Device Model IdentifierstringpolicyDevice model identifier of the mobile device.
Mobile Device Model NumberstringpolicyDevice model number of the mobile device.
Mobile Wi-Fi MAC AddressstringpolicyMAC address of the mobile device's wireless network interface, used for connecting to Wi-Fi networks.
Data Protection EnabledbooleanpolicyIndicates if data protection is enabled on the mobile device.
Block Level Encryption CapablebooleanpolicyVerifies that the mobile device is block level encryption capable.
File Level Encryption CapablebooleanpolicyVerifies that the mobile device is file level encryption capable.
Passcode PresentbooleanpolicyVerifies that a passcode is present on the mobile device.
Passcode CompliantbooleanpolicyVerifies that the passcode set on the mobile device is compliant with passcode complexity requirements.
Jailbreak DetectedbooleanpolicyDescribes whether or not a jailbreak is detected on the mobile device. Jailbreaking is the process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device.
Lost Mode EnabledbooleanpolicyDescribes whether or not Lost Mode is enabled. Lost Mode is a feature that allows you to lock a mobile device and track the device's location.
Mobile UsernamestringpolicyUsername of the user assigned to the mobile device in Jamf.

Additional Jamf information

This section covers details from Jamf for your integration.

Jamf device directory matching

This integration uses Apple Unique Device Identifier (UDID), a 24-character string assigned to all modern Apple devices. Beyond Identity does not use serial numbers to match devices to records.

Managed configurations for mobile devices

The Beyond Identity Platform Authenticator requires managed configurations for mobile devices. To map device information to the correct user and device population within Jamf Pro, managed configurations must be assigned. Mobile devices may be missing from Beyond Identity if they are not assigned with managed configurations. Confirm the accepted enrollment types can support managed applications for your organization. Not all MDM enrollment types are compatible with managed configurations.

Jamf Pro integration compatibility

The Beyond Identity Platform Authenticator app must be installed from managed channels, such as through Self Service or pushed to the device by Jamf Pro directly. Installations from the Apple App Store are not compatible with the integration as they do not include managed configurations.