Integrating with Google Identity
Integrating Jamf Connect with Google Cloud Identity involves two separate integration steps to use both the login window and menu bar app:
- Creating an OpenID Connect Integration for the login window
Jamf Connect uses the OpenID Connect authentication protocol to create local accounts and log in users via network authentication.
- Creating and deploying an LDAP certificate for menu bar app password syncing
Jamf Connect leverages LDAP authentication with Google's Secure LDAP service to verify a user's network password matches their local password on the Mac.
Creating an OpenID Connect Application Integration for the Login Window
You must integrate Jamf Connect with Google ID by creating OAuth 2.0 credentials for the app.
Your client credential for Jamf Connect has been successfully created, and a dialog containing your client ID and client secret will display.
Make sure to copy the client ID and client secret to your clipboard. These values must be included in your Jamf Connect configuration profile.
You must also configure Google's user consent screen, which describes what information Jamf Connect will access from the user's Google account. To configure this screen, navigate to .
Generating a PKCS12 (.p12) Keystore File from a Google Cloud LDAP Client
Google's Secure LDAP service generates a certificate that serves as the primary authentication mechanism for the LDAP clients to authenticate with Secure LDAP.
This certificate is used to allow Jamf Connect to sync a user's Google and local password on a Mac computer.
A Google Identity subscription that includes Google's LDAP service so you can download a certificate.
For a list of supported Google Identity subscriptions, see Supported Cloud Identity Providers.
For more information about Google's Secure LDAP service, see About the Secure LDAP service on the Google Workspace Admin Help website and Add and connect new LDAP clients on Google's Cloud Identity Help website.
OpenSSL must be installed in your local environment to convert the certificate and key to .p12 keystore format.
Deploying a .p12 Keystore File using Jamf Pro
A .p12 keystore file generated from an LDAP client in your Google Admin console must be installed on computers to allow Jamf Connect to sync user passwords.
You can use Jamf Pro to deploy this file by uploading it to the Certificates payload in a configuration profile.
The configuration profile is deployed to target computers.
Manually Installing a .p12 Keystore File
A .p12 keystore file generated from an LDAP client in your Google Admin console must be installed on computers to allow Jamf Connect to sync user passwords.
You can manually install this file by adding it to the system keychain via Keychain Access.
- Open Keychain Access, and drag and drop to the .p12 file into the System Keychain pane.
- When prompted, enter the LDAP client keystore password that you created when you generated the keystore file.
- From the System Keychain pane, click the My Certificates tab.
- Edit the LDAP certificate's trust settings to make the certifiacte always trusted:
- Right-hand click the LDAP certificate and click Evalute "Your-Certificate-Name"..., and then click Continue.
- Click Show Certificate...
- Expand the Trust expander, and then select from the pop-up menu.
- Allow all applications to access the certificate:
Testing a .p12 Keystore File and Connection
After Deploying a Keystore File via Jamf Pro or Manually Installing a Keystore File Locally, test the configuration with the ldapsearch command line tool.