Jamf Pro is comprehensive enterprise management software for the Apple platform to simplify IT management for Mac, iPad, iPhone and Apple TV (see https://www.jamf.com/products/jamf-pro/). You can protect access to Jamf Pro by integrating Jamf Pro with Identity as a Service. Once integrated, users can use single sign-on to log in to their Jamf Pro account through Identity as a Service.
Note: This integration was tested using Identity as a Service version 5.13 and Jamf Pro version 10.26.1-t1606923553. Other versions of Jamf Pro may require integration and configuration steps that differ from those documented in this procedure. For other versions of Jamf Pro, this integration guide may be used as an initial approach for integrating Jamf Pro. In the event of other issues, contact support@entrust.com for assistance.
Add Jamf Pro as an application to Identity as a Service
Log into your Identity as a Service administrator account.
Click
> Security > Applications. The Applications Lists page appears.
Click Add. The Select an Application Template page appears.
Do one of the following:
Select SAML Cloud Integrations from the search drop-down list and scroll to find the application you want to add to IDaaS.
- or -
In the Search bar, enter a search option to filter for the application you want to add to IDaaS.
Click JamF Pro. The Add Jamf Pro page appears.
Enter an Application Name.
Enter an Application Description.
Optional. Add a custom application logo.
Click
next to Application Logo. The Upload Logo dialog box appears.
Click
to select an image file to upload.
Browse to select your file and click Open. The Upload Logo dialog box reappears showing your selected image.
If required, resize your image.
Click OK.
Select the Authentication Flow that appears to users during login.
Click Next. The General page appears.
In the Default Assertion Consumer Service URL field, enter:
https://<mycompany>.jamfcloud.com/saml/SSO where <mycompany> is your Jamf Pro account name.
In the Service Provider Entity ID (Issuer) field, enter:
https://<mycompany>.jamfcloud.com/saml/metadata where <mycompany> is your Jamf Pro account name.
In the Single Logout Service URL field, enter:
https://<mycompany>.jamfcloud.com/saml/SingleLogout where <mycompany> is your Jamf Pro account name.
Optional. Enter the SAML Username Parameter Name used to identity the user ID being requested for authentication. The user ID can then be passed as a parameter, for example, Username=jdoe. Alternately, if the SAML username is NameID, the SAML Request XML NameID element value is used to the identify the IDaaS userID.
Enter the SAML Session Timeout to the time when the SAML Assertion times out. The maximum is 720 minutes.
Enter the Max Authentication Age (seconds) to set the maximum amount of time that can elapse before a user is required to reauthenticate during a new login attempt. This applies for both SP-initiated and IDP-initiated login. Set this field to -1 to disable this feature.
From the SAML NameID Attribute drop-down list, select Email.
From the SAML NameID Encoding Format drop-down list, select Unspecified.
Select the SAML Signing Certificate from the drop-down list.
Deselect Enable Go Back Button if you do not want users to be able to go back to the Jamf Pro login page to log in.
Select Show Default Assertion Consumer URL Service in the My Profile. When selected, the Default Assertion Consumer URL appears in a user's My Profile page in addition to relay states and Alternative Assertion Consumer URLs.
Optional. Add Alternative Assertion Consumer Service URLs, as follows:
Click Add.
Enter a Name.
Enter a URL Value.
Select Show in My Profile to display the Alternative Consumer Service URL in a user's My profile page.
Optional. Add an Application Logo.
Click Add.
Repeat these steps to add more Alternative Assertion Consumer Service URLs.
Leave the other fields at the default settings.
Click Submit.
Step 2: Add a resource ruleStep 2: Add a resource rule
Download the Metadata file from Identity as a Service
In Identity as a Service, click
> Security > Applications. The Applications List page appears.
Do one of the following:
Click
next to the application you are integrating with Identity as a Service.
–or–
Click
next to the application you are integrating with Identity as a Service and select SAML IDP Metadata.
The SAML Application Metadata dialog box appears.
Select the certificate to include in the SAML IDP Metadata file from the drop-down list.
If applicable, Select the domain to include in the SAML IDP Metadata file from the drop-down list.
Enter the Lifetime, in days, for the SAML IDP Metadata file. The value must be between 2 and 730.
Do one of the following, as required:
Copy the Public Endpoint to paste into your SAML application being used Identity Provider authentication.
Click Download.
Note: If you are using multiple domains, you must download each domain's metadata file separately because the values in the metadata file vary for each domain.
Add the Identity as a Service metadata to Jamf Pro
Log in to your Jamf Pro account as an administrator.
Click the
Settings button in the top-right. The Jamf Pro System Settings page appears.
Click the Single Sign-On icon. The Single Sign-On page appears.
Click Edit.
Select Enable Single Sign-On Authenticator.
From the Identity Providers drop-down list, select Other.
In the Other Provider field, enter a name, for example, Entrust IDaaS.
In the Entity ID field, enter:
https://<mycompany>.jamfcloud.com/saml/metadata where <mycompany> is your Jamf Pro account name.
From the Identity Provider Metadata Source drop-down list, select Metadata File.
Browse to select the file you downloaded in Step 3: Download the metadata file from Identity as a Service.
Under User Mapping, select NameID.
Under Jamf Pro User Mapping, select Email.
Ensure to select the following Single Sign-On Options for Jamf Pro:
Allow users to bypass the Single Sign-On authentication
Enable Single Sign-On for Self Service macOS
Enable Single Sign-On for User Initiated Enrollment
Configure Enrollment Access For Any identity provider user
Click Save.
Step 5: Test the integrationStep 5: Test the integration
Testing Service Provider Login
Open a Web browser and enter the URL for your Jamf Pro account. You are directed to Identity as a Service.
Enter your Jamf Pro account User ID and click Next.
Respond to the second-factor authentication challenge. If you respond successfully, you are logged in to Jamf Pro.
Testing Identity as a Service redirect log in
Log in to your Identity as a Service account.
Go to your My Profile page if you are not already there.
Under Applications, click Jamf Pro.
Respond to the second-factor authentication challenge. If you respond successfully, you are logged in to Jamf Pro.