Integrating with Microsoft Azure AD
You can now edit the app registration to grant admin consent for API calls and modify authentication settings.
If you are using Jamf Connect with Automated Device Enrollment (formerly DEP), remove this application from any conditional access controls. The user will be signing in to the computer before conditional access can be instantiated.
Granting Admin Consent for API Calls in Azure AD
- Navigate to your app registration.
- From the Manage section in the sidebar, click API permissions.
- In Grant Consent settings, click Grant admin consent for your company and then click Yes when prompted.
Modifying App Authentication Settings in Azure AD
Assigning Users
You can assign users to the application if you want to limit access. By default, any user in any domain can authenticate to the application. You can also do the following:
Hide Jamf Connect from users. This limits a user's interaction with the application to the loginwindow of a computer.
Grant admin consent for your organization. This can be done in the "Permissions" section of the application settings.
To ensure the User & groups tab is not unexpectedly hidden, make sure the Allow public client flows setting in Authentication settings is temporarily switched to No. After you assign users to the Jamf Connect app, you can re-enable this setting.
Configuring App Roles
You can create users as local administrators on computers by using app roles defined in Azure AD.
- Click the Azure Active Directory in the left sidebar.
- Click App registrations, and then select your Jamf Connect app registration.
- Click App Roles from the sidebar.
- Click + Create app role.
- In the Create app role pane, do the following:
- Repeat this process to create additional app roles.
Your Jamf Connect app registration now has two or more app roles for role-based local account creation.