![]() ![]() Name Identifier - Select " Email" from the dropdown menu. NameID Format - Select " Email address" from the dropdown menu.Sign in URL - The URL used to log in to your Jamf Pro instance.Issuer or Entity ID– Enter the EntityID of your Jamf Pro instance, which you can find in the Jamf metadata file.Under the SAML Service Provider Configuration tab, enter the following values: Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional).Out of Band Methods - Select the allowed methods for approving MFA requests.Type - Select "SAML Service Provider" from the options.Name - The application name displayed in the admin panel and application portal and used for push notifications and audit logs.In the New Application form, enter the following values under the General tab. ![]() Login to the Acceptto Dashboard with an administrative account and go to Applications.Ĭreate a new application by selecting the Create New Application. Keep the default settings in the User Mapping section.Īcceptto SAML Configuration as Identity Provider (IdP) # It should be, where myorganization is your unique identifier in Acceptto cloud. In the Identity Provider Metadata Source, select Metadata URL and paste your organization's Metadata URL on Acceptto. This is the metadata URL of Jamf Pro, and is required for the Acceptto configuration in the next section. In the Identity Provider part, select Other and type a name in the blank part. On the Single Sign-On Settings page, click Edit.Ĭheck the Enable Single-Sign-On Authentication box. Login to your Jamf Pro tenant and navigate to System Setting > Single Sign-On. Pre-Requisites #Īn Acceptto account with a configured Identity Provider and LDAP Agent (See this page for the instruction).Ī user with administrative privileges for the Jamf Pro portal.Ĭonfigure Jamf Pro as a SAML Service Provider # Acceptto integrates with Jamf Pro to improve the security of users' logins into the Jamf Pro through its Intelligent SSO-MFA solution. Jamf Pro is the Enterprise Mobility Management software that can manage an organization's Apple Ecosystem. I am assuming you already have Jamf Pro running, that is a requirement before we go any further.Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only they know or have access to. This again will allow you to have conditional access policies to control that only compliant Mac’s are allowed to access your corporate Office 365 environment. This post is not meant to learn you how to manage you Mac’s, but rather how you can integrate your Jamf Pro with Azure AD and Intune so that your Jamf managed Mac’s shows up as compliant devices in Azure AD. Intune standalone or Configuration Manager does not give you a way to have deep management of Mac’s today. Then you should take a look at what Jamf Pro can give you. If you have Apple Mac’s in your environment and want to use Conditional Access to control access to your Azure AD integrated applications and data, like Office 365. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |