Integrating with Google Identity
Integrating Jamf Connect with Google Cloud Identity involves two separate integration steps to use both the login window and menu bar app:
- Creating an OpenID Connect Integration for the login window
Jamf Connect uses the OpenID Connect authentication protocol to create local accounts and log in users via network authentication.
- Creating and deploying an LDAP certificate for menu bar app password syncing
Jamf Connect leverages LDAP authentication with Google's Secure LDAP service to verify a user's network password matches their local password on the Mac.
Creating an OpenID Connect Application Integration for the Login Window
You must integrate Jamf Connect with Google ID by creating OAuth 2.0 credentials for the app.
Your client credential for Jamf Connect has been successfully created, and a dialog containing your client ID and client secret will display.
Make sure to copy the client ID and client secret to your clipboard. These values must be included in your Jamf Connect configuration profile.
You must also configure Google's user consent screen, which describes what information Jamf Connect will access from the user's Google account. To configure this screen, navigate to .
Generating a PKCS12 (.p12) Keystore File from a Google Cloud LDAP Client
Google's Secure LDAP service generates a certificate that serves as the primary authentication mechanism for the LDAP clients to authenticate with Secure LDAP.
This certificate is used to allow Jamf Connect to sync a user's Google and local password on a Mac computer.
An LDAP client to download a certificate from.
For more information, see Add and connect new LDAP clients from Google's Cloud Identity Help web site.
To convert the certificate and key to .p12 keystore format, OpenSSL must be installed in your local environment.
Deploying a .p12 Keystore File using Jamf Pro
A .p12 keystore file generated from an LDAP client in your Google Admin console must be installed on computers to allow Jamf Connect to sync user passwords.
You can use Jamf Pro to deploy this file by uploading it to the Certificates payload in a configuration profile.
The configuration profile is deployed to target computers.
Manually Installing a .p12 Keystore File
A .p12 keystore file generated from an LDAP client in your Google Admin console must be installed on computers to allow Jamf Connect to sync user passwords.
You can manually install this file by adding it to the system keychain via Keychain Access.
- Open Keychain Access, and drag and drop to the .p12 file into the System Keychain pane.
- When prompted, enter the LDAP client keystore password that you created when you generated the keystore file.
- From the System Keychain pane, click the My Certificates tab.
- Edit the LDAP certificate's trust settings to make the certifiacte always trusted:
- Right-hand click the LDAP certificate and click Evalute "Your-Certificate-Name"..., and then click Continue.
- Click Show Certificate...
- Expand the Trust expander, and then select from the pop-up menu.
- Allow all applications to access the certificate: