Federated Integrations
A federated integration is a hybrid identity solution that allows your cloud identity provider (IdP) to pass authentication to another authentication method, such as on-premise Active Directory Federate Services (AD FS).
If a federated integration with AD FS is implemented in your environment, you can configure Jamf Connect to work alongside your federated integration by configuring Jamf Connect to use different cloud and on-premise endpoints for authentication and password syncing.
- Azure AD—
Use a registered app and endpoints in Azure AD to perform the authorization code grant that obtains access, refresh, and ID tokens from Azure AD.
- AD FS—
Use an AD FS app and endpoints to perform the resource owner password grant (ROPG) that verifies the user's local username and password are synced with on-premise Active Directory
To learn more about federated integrations with Azure AD, see the Azure AD Connect and federation documentation from Microsoft.
Configuring Jamf Connect with AD FS
A Jamf Connect registered app in Azure AD. For instructions, see Identity Provider Integrations.
A Jamf Connect application in AD FS . For instructions, see the Build a web application using OpenID Connect with AD FS 2016 and later documentation from Microsoft.
Azure AD Connect
Windows Server 2016 (includes AD FS 4.0) or later
You can now deploy the configuration profiles with an MDM solution.