Configure the Connection Between Jamf Pro and Microsoft Intune

Configuring the connection between Jamf Pro and Microsoft Intune involves the following steps:

  1. Create a new application for Jamf Pro in Microsoft Azure.

  2. Configure Microsoft Intune to allow the Jamf Pro integration.

  3. Configure the macOS Intune Integration setting in Jamf Pro.

Step 1: Create a new application for Jamf Pro in Microsoft Azure

  1. Open Azure Active Directory, and navigate to App registrations.

  2. Click New registration.

    1. Enter a display name for the Jamf Pro application.

    2. Under Supported account types, select which accounts can use the application.

    3. Specify your Jamf Pro URL as the Redirect URL.

    4. Click Register.

  3. Select the newly created application, copy the value from the Application (client) ID field and paste it to another location.

    Note: The Application ID is required to configure the Compliance Connector in Intune and for configuring the macOS Intune Integration setting in Jamf Pro.

  4. Navigate to Certificates & secrets, and click New client secret.

  5. Give the Client Secret a description and select an expiration option. Once a new secret has been added, copy the value for the secret and paste it to another location.

    Important: The Client Secret value is required to configure the macOS Intune Integration setting in Jamf Pro. The value for the secret is shown only once after the secret is added. If the Client Secret expires, you must add a new Client Secret in Microsoft Azure, and then update your macOS Intune Integration configuration in Jamf Pro. Microsoft Azure allows you to have both the old secret and new secret active to prevent service disruptions.

  6. Navigate to API permissions.

    1. Remove all permissions, including the default permissions.

    2. Click Add a permission.

    3. Under the Intune API, click Application permissions, and then select update_device_attributes.

    4. Click Add permissions.

    5. Click Grant admin consent for Jamf, and then click Yes.

Step 2: Configure Microsoft Intune to allow the Jamf Pro integration

  1. In the Microsoft Azure portal, navigate to Microsoft Intune > Device Compliance > Partner device management.

  2. Enable the Compliance Connector for Jamf by pasting the value you copied from the Application ID field into the Jamf Azure Active Directory App ID field.

  3. Click Save.

Step 3: Configure the macOS Intune Integration setting in Jamf Pro

  1. In Jamf Pro, navigate to Settings > Global Management.

  2. Click Conditional Access images/download/attachments/47906848/ConditionalAccess_small.png .

  3. Navigate to the macOS Intune Integration tab, and then click Edit.

  4. Select the Enable Intune Integration for macOS checkbox.
    When this setting is enabled, Jamf Pro sends inventory updates to Microsoft Intune. Clear the selection if you want to disable the connection but save your configuration.

  5. Select the location of your Sovereign Cloud from Microsoft.

  6. Click Open administrator consent URL, and follow the onscreen instructions to allow the Jamf Native macOS Connector app to be added to your Azure AD tenant.

  7. Add the Azure AD Tenant Name from Microsoft Azure.

  8. Add the Application ID and Client Secret (previously called Application Key) for the Jamf Pro application from Microsoft Azure.

  9. Select one of the following landing page options for computers that are not recognized by Microsoft Azure:

    • The Default Jamf Pro Device Registration page

      Note: Depending on the state of the computer, this option redirects users to either the Jamf Pro device enrollment portal (to enroll with Jamf Pro) or the Company Portal app (to register with Azure AD).

    • The Access Denied page

    • A custom webpage

  10. Click Save.
    Jamf Pro will test the configuration and report the success or failure of the connection.

Copyright     Privacy Policy     Terms of Use     Security
© copyright 2002-2019 Jamf. All rights reserved.