Integrating with Microsoft Azure AD
Microsoft Azure AD Change Required
If Microsoft Azure AD is your identity provider (IdP), upcoming changes to Microsoft Authentication Library (MSAL) require changes to your Jamf Connect configuration. Existing applications remain functional, but in December 2022 Microsoft will discontinue security updates for Azure Active Directory Authentication Library (ADAL), deprecating the use of common endpoints.
To align Jamf Connect with these changes, you must include organization-specific tenant information for your registered authentication applications in your configuration using the OIDC Tenant login window preference or the Tenant menu bar app preference. The information entered applies to all Jamf Connect products and is required to use ROPG test in Jamf Connect Configuration. If both of these fields are left blank, you will receive an alert that a required field is missing. This helps you set up your configuration correctly.
For more information, see the OIDC Tenant preference in and the Tenant ID preference in . Also see Migrate applications to the Microsoft Authentication Library (MSAL) in the Microsoft Azure Product Documentation.
You can now edit the app registration to grant admin consent for API calls and modify authentication settings.
If you are using Jamf Connect with Automated Device Enrollment (formerly DEP), remove this application from any conditional access controls. The user will be signing in to the computer before conditional access can be instantiated.
Granting Admin Consent for API Calls in Azure AD
- Navigate to your app registration.
- From the Manage section in the sidebar, click API permissions.
- In Grant Consent settings, click Grant admin consent for your company and then click Yes when prompted.
Modifying App Authentication Settings in Azure AD
Assigning Users
You can assign users to the application if you want to limit access. By default, any user in any domain can authenticate to the application. You can also do the following:
Hide Jamf Connect from users. This limits a user's interaction with the application to the login window of a computer.
Grant admin consent for your organization. This can be done in the "Permissions" section of the application settings.
Configuring App Roles in Azure AD
You can create users as local administrators on computers by using app roles defined in Azure AD.
- Click the Azure Active Directory in the left sidebar.
- Click App registrations, and then select your Jamf Connect app registration.
- Click App Roles from the sidebar.
- Click + Create app role.
- In the Create app role pane, do the following:
- Repeat this process to create additional app roles.
Your Jamf Connect app registration now has two or more app roles for role-based local account creation.