Starting Your Deployment

There are two main steps to deploying Jamf security services to your devices:

  1. Create an Activation Profile. See Activation Profiles for more information.

  2. Choose a deployment method:

    • Open Enrollment using a shareable link for unmanaged devices

    • Managed Deployment via your UEM solution for managed devices

    The best deployment method for you will depend on a number of different factors, including your use case, device, platform, and environment.

    Note:

    No matter which options you choose, Jamf recommends that you configure Identity Provider Authentication, for both security and ease of use. If configured, users can activate the Jamf Trust app on their devices more easily. For more information, see Identity Providers.