Bug Fixes and Enhancements

Correction—Updated 10 February 2021

The following bug fix in Jamf Pro 10.27.0 was inadvertently not included in the original publishing of these release notes:

[PI-009015] Fixed an issue that caused Jamf Pro to remove expired user sessions that resulted in memory issues in clustered environments.

Correction—Updated 5 November 2021

The following known issues in Jamf Pro 10.27.0 were incorrectly documented as fixed in the original publishing of these release notes:

  • [PI-007777] Fixed an issue that caused computers to enroll as unmanaged when the certificate authority was changed from a SCEP-enabled external CA to Jamf Pro's built-in CA.

  • [PI-009166] Fixed an issue that sometimes caused inventory updates for mobile devices to fail if they belonged to a smart group containing the MDM Profile Renewal Needed criteria and Jamf Pro's built-in CA certificate was not renewed.

Jamf Pro Server

  • [PI-003105] Fixed an issue that prevented deleting folders with symlinks or .framework files when uninstalling an indexed package with a policy.

  • [PI-005188] Fixed an issue that, when viewing from a site, caused attachment downloads in inventory records to fail to download or be unable to be opened after downloading.

  • [PI-005494] Fixed an issue that caused members of a clustered Jamf Pro environment to not synchronize with the signing certificates needed for issuing device identity certificates or signing profiles. This condition could last up to six hours and could be triggered by the following events:

    • Enabling the use of the external CA for enrollment when it was already enabled for configuration profiles

    • Enabling the use of the external CA for configuration profiles when it was already enabled for enrollment

    • Uploading a new signing certificate for the external CA when it was already enabled for enrollment or for configuration profiles

    • Disabling the use of the external CA for enrollment

  • [PI-006034] Added additional safeguards to prevent the creation of duplicate users. This will prevent issues with mass deletion of users with device assignments.

  • [PI-006753] Fixed an issue that caused Jamf Pro servers hosted on Windows to be unable to send email reports from advanced searches for computers and mobile devices.

  • [PI-006835] Fixed an issue in which certain credentials used by the Jamf Pro web application were hard-coded.

  • [PI-007304] Fixed an issue that caused Jamf Pro to become unresponsive if an invalid activation code was entered twice.

  • [PI-007699] Fixed an issue that caused Jamf Pro to fail to distribute a later version of a B2B app.

  • [PI-007746] Fixed an issue that prevented users from enrolling via user-initiated enrollment and administrators from viewing the User-Initiated Enrollment settings if users were assigned to an access group where the group ID was mapped to an attribute with a non-integer value and the LDAP group name was listed alphanumerically before the "All LDAP Users" group.

  • [PI-007747] Fixed an issue that caused User-Initiated Enrollment LDAP Access Group names to display incorrectly if multiple groups were mapped to the same GroupID.

  • [PI-007819] Fixed an issue that caused Jamf Pro to incorrectly display settings in the Applications & Custom payload of a computer configuration profile.

  • [PI-007852] Fixed an issue that caused User Enrollment to fail when a third-party signing certificate was added to the User-Initiated Enrollment settings.

  • [PI-007997] Fixed an issue that, in some instances, prevented the site assigned to an object from being changed.

  • [PI-008068] Fixed an issue that caused Jamf Pro as SCEP Proxy and the Jamf ADCS Connector to incorrectly treat pending responses as failed when deploying configuration profiles.

  • [PI-008199] Fixed an issue that sometimes prevented an updated in-house app from updating on a device if the app had not finished uploading in Jamf Pro.

  • [PI-008635] Fixed an issue that caused the Send Update button in the Conditional Access settings to send incorrect password values to Microsoft Azure, resulting in a loss of compliance for all computers.

  • [PI-008724] The Jamf Pro API Swagger documentation no longer allows HTML injection.

  • [PI-008851] Fixed an issue that allowed certain Self Service API endpoints to incorrectly provide limited information without authentication.

  • [PI-008907] Computers attempting to enroll with Jamf Pro via a PreStage enrollment with an expired certificate signed by “Apple iPhone Device CA” no longer fail to enroll or display a 403 error message.

  • [PI-008988] Fixed an issue that caused the Jamf Pro API to fail to rename an Apple TV device.

  • [PI-008997] Fixed an issue that prevented disabling User Login for Self Service for macOS if it was enabled prior to upgrading to Jamf Pro 10.25.1.

  • [PI-009002] Fixed an issue that incorrectly allowed TCP port scanning via LDAP directory service settings in Jamf Pro.

  • [PI-009007] Fixed an issue that prevented Jamf Pro from enforcing serial numbers for the names of Apple TV devices when configured to do so in a PreStage enrollment.

  • [PI-009009] The Classic API Swagger documentation no longer allows HTML injection.

  • [PI-009070] Fixed an issue that caused Jamf Pro to fail to translate the dashboard to languages other than English.

  • [PI-009074] Fixed an issue that caused Jamf Pro to fail to display history information for Engage and Jamf Teacher settings.

  • [PI-009077] Fixed an issue that prevented Jamf Pro from correctly sending a push for the RemoveProfile MDM command after the command was queued when deleting or modifying a user-level mobile device configuration profile.

  • [PI-009244] Fixed an issue that prevented Jamf Pro from removing a configuration profile from a computer if the payload UUID did not match the payload identifier of the profile.

  • [SUS-7394] Fixed an issue that caused some tables in Jamf Pro to appear to support date filtering.

  • [PA-1208] Fixed an issue that sometimes caused buttons in Jamf Pro to display the wrong icon.

Copyright     Privacy Policy     Terms of Use     Security
© copyright 2002-2021 Jamf. All rights reserved.