![]() SSO with Jamf Pro can be enabled for the following: After authentication, users obtain access to the resource they were attempting to access. When SSO is configured and enabled, users are automatically redirected to your organization's IdP login page. You can integrate with a third-party identity provider (IdP) to enable single sign-on (SSO) for portions of Jamf Pro. Provisioning Profiles for In-House Apps.JSON Web Token for Securing In-House Content.User-Assigned Volume Purchasing Registration.Content Distribution Methods in Jamf Pro.Importing Users to Jamf Pro from Apple School Manager.Settings and Security Management for Mobile Devices.Mobile Device Inventory Display Settings.Mobile Device Inventory Collection Settings.Mobile Device Inventory Information Reference.User Enrollment Experience for Mobile Devices.User-Initiated Enrollment Experience for Mobile Devices.User-Initiated Enrollment for Mobile Devices.Application Usage for Licensed Software.Settings and Security Management for Computers.Computer Inventory Information Reference.User-Initiated Enrollment Experience for Computers.User-Initiated Enrollment for Computers.Building the Framework for Managing Computers.Jamf Self Service for iOS Branding Settings.About Jamf Self Service for Mobile Devices.Items Available to Users in Jamf Self Service for macOS.Jamf Self Service for macOS Branding Settings.Jamf Self Service for macOS Notifications.Jamf Self Service for macOS Configuration Settings.Jamf Self Service for macOS User Login Settings.Jamf Self Service for macOS Installation Methods.Integrating with Automated Device Enrollment.Integrating with Cloud Identity Providers.Integrating with LDAP Directory Services.Components Installed on Managed Computers.# Use user account's username and password credentials with Basic Authorization to request a bearer token. # This function uses Basic Authentication to get a new bearer token for API authentication. # Remove the trailing slash from the Jamf Pro URL if needed. Read -p "Please enter the password for the $jamfpro_user account: " -s jamfpro_password Read -p "Please enter your Jamf Pro user account : " jamfpro_user Read -p "Please enter your Jamf Pro server URL : " jamfpro_url # otherwise, you will be prompted to enter the requested URL or account credentials. # If the Jamf Pro URL, the account username or the account password aren't available Jamfpro_password= $(defaults read $HOME/Library/Preferences/-info jamfpro_password ) Jamfpro_user= $(defaults read $HOME/Library/Preferences/-info jamfpro_user ) Jamfpro_url= $(defaults read $HOME/Library/Preferences/-info jamfpro_url ) ![]() # defaults write $HOME/Library/Preferences/-info jamfpro_password API_account_password_goes_here # defaults write $HOME/Library/Preferences/-info jamfpro_user API_account_username_goes_here # defaults write $HOME/Library/Preferences/-info jamfpro_url To create the file, run the following commands: # Read the appropriate values from ~/Library/Preferences/ # Set the password here if you want it hardcoded. # Set the username here if you want it hardcoded. # Set the Jamf Pro URL here if you want it hardcoded. # The username for an account on the Jamf Pro server with sufficient API privileges # If you choose to hardcode API information into the script, set one or more of the following values: # Explicitly set initial value for the token_expiration variable to null: # Explicitly set initial value for the api_token variable to null: # This script uses the Jamf Pro API to get an authentication token
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |