General Requirements

To use Jamf Connect, you need the following:
  • Computers with macOS 10.14 or later

  • A Jamf Connect license file and product download
    Note:

    The license key is provided by your account manager. The same license key may be used for all Jamf Connect apps. For instructions on deploying the license, see Installation and Licensing.

  • A cloud identity provider (IdP)


  • A method to deploy Jamf Connect packages and files on computers. An MDM solution, such as Jamf Pro, is recommended.

FileVault Requirements

If you want to use Jamf Connect to enable FileVault on computers with macOS 10.15 or later, you also need to install a configuration profile with the Privacy Preferences Policy Control payload. For instructions, see the FileVault Enablement with Jamf Connect.

Network Requirements

If your organization uses an 802.1x network, the authentication type must be compatible with the macOS login window to work with Jamf Connect. For example, a configuration profile for certificate-based authentication (such as EAP-TLS) must be installed at the computer-level.

Note:

User-level authentication to an 802.1x network (such as EAP-PEAP and EAP-TTLS) is not supported at the macOS login window with Jamf Connect. For more information about connecting to enterprise networks on macOS, see Connecting Apple devices to 802.1x networks from Apple's Support website.

For more information about configuring enterprise networks with Jamf Pro, see the Implementing 802.1X Authentication Using Jamf Pro technical paper

Supported Cloud Identity Providers

The following cloud identity providers (IdPs) are supported by Jamf Connect.

  • Google Cloud Identity

    Important:

    Google Cloud Identity does not currently support password syncing with Jamf Connect, and the menu bar app cannot be used.

  • IBM Security Verify

  • Microsoft Azure AD

  • Okta

  • OneLogin

  • PingFederate

If your organization uses an IdP that is not currently supported but can use OpenID Connect authentication, see Integrating with a Custom Identity Provider.