Jamf pro sso7/5/2023 ![]() ![]() Select Add user, then select Users and groups in the Add Assignment dialog box.In the app's overview page, find the Manage section and select Users and groups.In the applications list, select Jamf Pro.In the Azure portal, select Enterprise Applications, and then select All applications.In this section, you grant B.Simon access to Jamf Pro. In the User name field, enter For example, Select the Show password check box, and then write down the value that's displayed in the Password box.In the User properties, follow these steps:.Select New user at the top of the screen.In the left pane in the Azure portal, select Azure Active Directory, select Users, and then select All users.In this section, you create a test user in the Azure portal called B.Simon. On the Set up Single Sign-On with SAML page, go to the SAML Signing Certificate section, select the copy button to copy App Federation Metadata URL, and then save it to your computer. You can also refer to the formulas shown in the Basic SAML Configuration section in the Azure portal. You can extract the actual subdomain value from the identifier value and use that subdomain information as your sign-on URL and reply URL. You'll get the actual identifier value from the Single Sign-On section in Jamf Pro portal, which is explained later in the tutorial. Update these values with the actual identifier, reply URL, and sign-on URL. If you want to configure the application in SP-initiated mode, in the Sign-on URL text box, enter a URL that uses the following formula: In the Reply URL text box, enter a URL that uses the following formula: In the Identifier text box, enter a URL that uses the following formula: ![]() On the Basic SAML Configuration section, if you want to configure the application in IdP-initiated mode, enter the values for the following fields:Ī. On the Set up Single Sign-On with SAML page, select the pencil icon for Basic SAML Configuration to edit the settings. ![]() On the Select a Single Sign-On Method page, select SAML. In the Azure portal, on the Jamf Pro application integration page, find the Manage section and select Single Sign-On. In this section, you enable Azure AD SSO in the Azure portal. Test the SSO configuration to verify that the configuration works.Create a Jamf Pro test user to have a counterpart of B.Simon in Jamf Pro that's linked to the Azure AD representation of the user.Configure SSO in Jamf Pro to configure the SSO settings on the application side.Assign the Azure AD test user so that B.Simon can use SSO in Azure AD.Create an Azure AD test user to test Azure AD SSO with the B.Simon account.Configure SSO in Azure AD so that your users can use this feature.In this section, you configure and test Azure AD SSO with Jamf Pro. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Jamf Pro. Configure and test SSO in Azure AD for Jamf ProĬonfigure and test Azure AD SSO with Jamf Pro by using a test user called B.Simon. In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. Wait a few seconds while the app is added to your tenant.Īlternatively, you can also use the Enterprise App Configuration Wizard. Select Jamf Pro from results panel, and then add the app.In the Add from the gallery section, enter Jamf Pro in the search box.To add a new application, select New application.Go to Enterprise Applications, and then select All Applications.In the left pane, select the Azure Active Directory service.Sign in to the Azure portal by using either a work or school account or your personal Microsoft account.To configure the integration of Jamf Pro into Azure AD, you need to add Jamf Pro from the gallery to your list of managed SaaS apps. Jamf Pro supports SP-initiated and IdP-initiated SSO.In this tutorial, you configure and test Azure AD SSO in a test environment. A Jamf Pro subscription that's single sign-on (SSO) enabled.If you don't have a subscription, you can get a free account. ![]() To get started, you need the following items:
0 Comments
Leave a Reply. |