Passthrough Authentication with Jamf Connect
Passthrough authentication with Jamf Connect allows the password entered by users in the login window web view to be sent to Jamf Connect for local authentication. This improves the login and account creation experience in the following ways:
Network and local authentication are completed without requiring users to re-enter a password. The Verify screen is skipped during during the login process.
Note:Passthrough authentication with Google Cloud ID does not enforce or enable password syncing at the login window. When users with different network and local account passwords log in to their existing local account, users will continue to be prompted to enter both passwords to log in.
To sync passwords for Google users, the menu bar app must be configured.
During local account creation, the network password is automatically used as the new local password. This ensures that the passwords match after account creation.
When passthrough authentication is enabled with the login window, user passwords entered in the login window web view are temporarily written to memory and used to log in or create a local account on computers. When Jamf Connect is finished with the user's password, the value is immediately overwritten as nil
and deallocated from memory.
Enabling Passthrough Authentication
Passthrough authentication is not enabled by default and must be enabled in a Jamf Connect login window configuration profile.
Passthrough authentication is only supported in IdP environments that use the OpenID Connect authentication protocol (IdP).
OIDCUsePassthroughAuth
) setting in a Jamf Connect login window configuration profile.- Azure AD, OneLogin, or PingFederate
Make sure the a Create a Separate Local Password (
OIDCNewPassword
) setting is tofalse
or undefined.<key>OIDCUsePassthroughAuth</key> <true/> <key>OIDCNewPassword</key> <false/>
- Google Cloud ID
Make sure the Create a Separate Local Password (
OIDCNewPassword
) setting is totrue
or undefined.<key>OIDCUsePassthroughAuth</key> <true/> <key>OIDCNewPassword</key> <true/>