본문 바로가기

카테고리 없음

Add App File For Os X To Jamf Admin



Mar 12, 2019 Adding the.app File for macOS to Jamf Admin. Open Jamf Admin and authenticate to the Jamf Pro server. Drag the.app file to the main repository in Jamf Admin. Jamf Admin extracts the InstallESD.dmg file, analyzes its contents, and adds it to the. Double-click the package in the main repository.

Over the years, Apple has put its vast resources into making it's operating systems more secure for end-users. In macOS Catalina, the company has taken this to all-new levels by introducing beneficial security changes that make it even harder for miscreants to play havoc with our computers. However, because security is a tricky business, so-called improvements for some might not work for others. Specifically, Apple's decision to make Gatekeeper even more difficult crack is a significant step forward for everyday Mac users. For developers, perhaps not so much. Luckily, there's a workaround.

  • Select the File Sharing checkbox. To select a specific folder to share, click the Add button at the bottom of the Shared Folders list, locate the folder, select it, then click Add. The Public folder of each user with an account on your Mac is shared automatically.
  • Sign in to the Microsoft Endpoint Manager admin center and go Tenant administration Partner device management. On the Partner device management node, delete the Application ID in the Specify the Azure Active Directory App ID for Jamf field, and then select Save.

Warning: This terminal trick disables important security aspects of Gatekeeper, which leaves your Mac vulnerable to malware. We highly recommend you reinable the default security settings if you chose to follow this guide at your own risk.

What is Gatekeeper?

Gatekeeper has been an essential part of macOS for years. As its name suggests, the tool has been designed to check recently downloaded apps for known malware and sends it to quarantine. In his June article, The Great Mac Balancing Act, Rene Ritchie explains:

Currently, when you download an app, whether it's off the Store or the Web or even from AirDrop, that app is quarantined. If and when you try to open a quarantined app, Gatekeeper checks it for known malware, validates the developer signature to make sure it hasn't been tampered with, makes sure it's allowed to run, for example matches your settings for App Store apps and/or known developer apps, and then double checks with you that you really want to run the app for the first time, that it's not trying to pull a fast one and autorun itself.

Until now, Gatekeeper didn't take the same approach with apps launched via Terminal. It also didn't check non-quarantined apps and files for malware. In other words, it checked an app only once for malware.

Significant changes have arrived with macOS Catalina.

Now, apps started through Terminal are also checked. These files get the same malware scan, signature check, and local security policy check. The difference: even on the first run, you only need to explicitly approve software launched in bundles, like a standard Mac app bundle, not for standalone executables or libraries.

With macOS Catalina, perhaps more significantly, Gatekeeper will also check non-quarantined apps and files for problems. Not just once or twice, but every time you run it. When your Mac detects a problem, it blocks the file, then sends you an alert.

If all this sounds fantastic to you, terrific. That's undoubtedly Apple's intent. However, some developers might view this differently and find the changes cumbersome, at best.

A Workaround

Even though Gatekeeper in macOS is now stricter than ever, there is a way around it -- including macOS Catalina's newest tools. The workaround makes it possible to download and use apps downloaded from anywhere on macOS Catalina and earlier versions without a check.

File

First published in 2016 by OSX Daily, but still valid, the 'fix' works like this:

  1. Be sure to exit System Preferences on your Mac.
  2. On Finder, click Go.
  3. Select Utilities.
  4. Double-click Terminal.

  5. Type of the following command syntax: sudo spctl --master-disable .
  6. Hit Return
  7. Authenticate with an admin password.
  8. Hit Return.
  9. Exit Terminal.

Changing your settings

Now, it's time to allow your Mac to open any app.

  1. Click on System Preferences on your Mac Dock.
  2. Choose Security & Privacy.
  3. Tap the lock at the bottom left of the screen.

  4. Enter your password to unlock Security and Privacy.
  5. Choose the Anywhere under Allow apps downloaded from. Prior to making the change, this option wasn't available.
  6. Click the unlocked lock to keep the change.

With this change, Gatekeeper no longer monitors your computer for malware coming from apps and files.

Restoring to the original setting

If you'd like to return to the default Gatekeeper settings, perform these steps:

  1. Be sure to exit System Preferences on your Mac.
  2. On Finder, click Go.
  3. Select Utilities.
  4. Double-click Terminal.

  5. Type of the following command syntax: sudo spctl --master-enable .
  6. Hit Return
  7. Authenticate with an admin password.
  8. Hit Return.
  9. Exit Terminal.

View the change

To confirm your Mac has returned to the default settings:

  1. Click on System Preferences on your Mac Dock.
  2. Choose Security & Privacy.

Under Allow apps downloaded from, notice the select is now App Store and identified developers.

Should you make this switch?

For nearly every Mac user, there's no reason to make the listed change under Security & Privacy on macOS Catalina. It should only be performed if you can quickly determine whether apps are legitimate or not. Keep this in mind.

Questions?

If you have any questions or concerns about Gatekeeper or the rest of the macOS Catalina update, let us know in the comments below.

macOS Catalina

Main

We may earn a commission for purchases using our links. Learn more.

Your tea–your way

Review: Free Your Tea Subscription Box is personalized just for your tastes

The Free Your Tea Subscription Box uses a number of methods to get you your perfect blend of teas each month.

-->

This article can help you install the Jamf Cloud Connector to integrate Jamf Pro with Microsoft Intune. The Cloud Connector automates many of the steps that are required when you manually configure integration as documented in Integrate Jamf Pro with Intune for compliance.

When you set up the Cloud Connector:

  • Set up automatically creates the Jamf Pro applications in Azure, replacing the need to manually configure them.
  • You can integrate multiple instances of Jamf Pro with the same Azure tenant that hosts your Intune subscription.

Connecting multiple instances of Jamf Pro with a single Azure tenant is supported only when you use the Cloud Connector. When you use a manually configured connection, only a single instance of Jamf can integrate with an Azure tenant.

Use of the Cloud Connector is optional:

  • For new tenants that don't yet integrate with Jamf, you can choose to configure the Cloud Connector as described in this article. Or you can manually configure integration as described in Integrate Jamf Pro with Intune for compliance
  • For tenants that already have a manual configuration, you can choose to remove that integration, and then set up the Cloud Connector. Both the removal of an existing integration and set up of the Cloud Connector are described in this article.

If you plan to replace your previous integration with the Jamf Cloud Connector:

  • Use the procedure to remove your current configuration, which includes deleting the Enterprise apps for Jamf Pro and disabling the manual integration. Then you can use the procedure to configure the Cloud Connector.
  • You won't need to re-register devices. Devices tht are already registered can use the Cloud Connector without additional configuration.
  • Be sure to configure the Cloud Connector within 24 hours of removing your manual integration to ensure your registered devices can continue to report their status.

For more information about the Jamf Cloud Connector, see Configuring the macOS Intune Integration using the Cloud Connector on docs.jamf.com.

Prerequisites

Products and services:

  • Jamf Pro 10.18 or later
  • A Jamf Pro user account with Conditional Access privileges
  • Microsoft Intune
  • Microsoft Azure AD Premium
  • macOS devices with OS X 10.12 Yosemite or later

Network:
The following ports and endpoints must be accessible for Jamf and Intune to integrate correctly:

  • Intune: Port 443

  • Apple: Ports 2195, 2196, and 5223 (push notifications to Intune)

  • Jamf: Ports 80 and 5223

  • Endpoints:

    • login.microsoftonline.com
    • graph.windows.net
    • *.manage.microsoft.com

For APNS to function correctly on the network, you must enable outgoing connections to, and redirects from the following ports:

  • The Apple 17.0.0.0/8 block over TCP ports 5223 and 443 from all client networks.
  • Ports 2195 and 2196 from Jamf Pro servers.

For more information about these ports, see the following articles:

  • Intune network configuration requirements and bandwidth.
  • Network Ports Used by Jamf Pro on jamf.com.
  • TCP and UDP ports used by Apple software products on support.apple.com

Accounts:
Procedures in this article require use of accounts with the following permissions:

  • Jamf Pro console: An account with permissions to manage Jamf Pro
  • Microsoft Endpoint Management admin center: Global Administrator
  • Azure portal: Global Administrator

Remove the Jamf Pro integration for a previously configured tenant

Use the following procedure to remove a manually configured integration of Jamf Pro from your Azure tenant before you can configure the Cloud Connector.

If you have not previously set up a connection between Jamf Pro and Intune, or if you have one or more connections that already use the Cloud Connector, skip this procedure and begin with Configure the Cloud Connector for a new tenant.

Os X El Capitan

Remove a manually configured Jamf Pro integration

Add App File For Os X To Jamf Admin

  1. Sign in to the Jamf Pro console.

  2. Select Settings (the gear icon in the upper right corner), and then go to Global Management > Conditional Access.

  3. Select Edit.

  4. De-select the checkbox for Enable Intune Integration for macOS.

    When you deselect this setting, you disable the connection but save your configuration.

  5. Sign in to the Microsoft Endpoint Manager admin center and go Tenant administration > Partner device management.

    On the Partner device management node, delete the Application ID in the Specify the Azure Active Directory App ID for Jamf field, and then select Save.

    The Application ID is the ID of the Azure Enterprise app that was created in Azure when you set up a manual integration if Jamf Pro.

  6. Sign in to the Azure portal with an account that has Global Admin permissions, and go to Azure Active Directory > Enterprise applications.

    Locate the two Jamf apps and delete them. New applications will be automatically created when you configure the Jamf Cloud Connector in the next procedure.

    After you've disabled integration in Jamf Pro, and deleted the Enterprise applications, the Partner device management node displays the connection status of Terminated.

Now that you've successfully removed the manual configuration for Jamf Pro integration, you can set up integration using the Cloud Connector. To do so, see Configure the Cloud Connector for a new tenant in this article.

Configure the Cloud Connector for a new tenant

Use the following procedure to configure the Jamf Cloud Connector to integrate Jamf Pro and Microsoft Intune when:

  • You don't have any integration between Jamf Pro and Intune configured for your Azure tenant.
  • You already have a Cloud Connector set up between Jamf Pro and Intune in your Azure tenant and want to integrate an additional Jamf instance with your subscription.

If you currently have a manually configured integration between Intune and Jamf Pro, see Remove the Jamf Pro integration for a previously configured tenant in this article to remove that integration before proceeding. Removal of a manually configured integration is required before you can successfully set up the Jamf the Cloud Connector.

Os X Download

Create a new connection

  1. Sign in to the Jamf Pro console.

  2. Select Settings (the gear icon in the upper right corner0, and then go to Global Management > Conditional Access.

  3. Select Edit.

  4. Select the checkbox for Enable Intune Integration for macOS.

    • Select this setting to have Jamf Pro send inventory updates to Microsoft Intune.
    • You can deselect this setting to disable the connection but save your configuration.

    Important

    If Enable Intune Integration for macOS is already selected and the Connection Type is set to Manual, you must remove that integration before continuing. See Remove the Jamf Pro integration for a previously configured tenant in this article before continuing.

  5. Under Connection Type, select Cloud Connector.

  6. From the Sovereign Cloud pop-up menu, select the location of your Sovereign Cloud from Microsoft. If you're replacing your previous integration with the Jamf Cloud Connector, you can skip this step if the location has been specified.

  7. Select one of the following landing page options for computers that are not recognized by Microsoft Azure:

    • The Default Jamf Pro Device Registration page - Depending on the state of the macOS device, this option redirects users to either the Jamf Pro device enrollment portal (to enroll with Jamf Pro) or the Intune Company Portal app (to register with Azure AD).
    • The Access Denied page
    • Custom URL

    If you're replacing your previous integration with the Jamf Cloud Connector, you can skip this step if the landing page has been specified.

  8. Select Connect. You are redirected to register the Jamf Pro applications in Azure.

    When prompted, specify your Microsoft Azure credentials and follow the onscreen instructions to grant the requested permissions. You'll grant permissions for the Cloud Connector, and then again for the Cloud Connector user registration app. Both apps are registered in Azure as Enterprise Applications.

    After permissions are granted for both apps, the Application ID page opens.

  9. On the Application ID page, select Copy and open Intune.

    The Application ID is copied to your system clipboard for use in the next step, and the Partner device management node in the Microsoft Endpoint Manager admin center opens. (Tenant administration > Partner device management).

  10. On the Partner device management node, Paste the Application ID in to the Specify the Azure Active Directory App ID for Jamf field, and then select Save.

  11. Return to the Application ID page in Jamf Pro and select Confirm.

  12. Jamf Pro completes and tests the configuration and displays the success or failure of the connection on the Conditional Access settings page. The following image is an example of success:

  13. In the Microsoft Endpoint Manager admin center, refresh the Partner device management node. The connection should now show as Active:

When the connection between Jamf Pro and Microsoft Intune is successfully established, Jamf Pro sends inventory information to Microsoft Intune for each computer that is registered with Azure AD (registering with Azure AD is an end-user workflow). You can view the Conditional Access Inventory State for a user and a computer in the Local User Account category of a computer's inventory information in Jamf Pro.

After you integrate one instance of Jamf Pro by using the Jamf Cloud Connector, you can use this same procedure to configure additional instances of Jamf Pro with the same Intune subscription in your Azure tenant.

Set up compliance policies and register devices

After you configure integration between Intune and Jamf, you need to apply compliance policies to Jamf-managed devices.

Disconnect Jamf Pro and Intune

Should you need to remove integration of Jamf Pro with Intune, use the following steps to remove the connection from within the Jamf Pro console.This information applies to both the Cloud Connector and for a manually configured integration.

  1. In Jamf Pro, go to Global Management > Conditional Access. On the macOS Intune Integration tab, select Edit.

  2. Clear the Enable Intune Integration for macOS check box.

  3. Select Save. Jamf Pro sends your configuration to Intune and the integration will be terminated

  4. Sign in to the Microsoft Endpoint Manager admin center.

  5. Select Tenant administration > Connectors and tokens > Partner device management to verify that the status is now Terminated.

    Note

    Your organization's Mac devices will be removed at the date (3 months) shown in your console.

Get support for the Cloud Connector

Because the cloud connector automatically creates the Azure Enterprise apps necessary for integration, your first point of contact for support should be Jamf. Options include:

10.12

  • Email support at support@jamf.com
  • Use the support portal at Jamf Nation: https://www.jamf.com/support/

Prior to contacting support:

  • Review the Prerequisites such as ports and product version you use.

  • Confirm that permissions for the following two Jamf Pro apps created in Azure have not been modified. Changes to the app permissions are not supported by Intune and can cause integration to fail.

    Cloud Connector user registration app:

    • API Name: Microsoft Graph
      • Permission: Sign in and read user profile
      • Type: Delegated
      • Granted through: Admin consent
      • Granted by: An administrator

    Cloud Connector app:

    • API Name: Microsoft Graph (instance 1)

      • Permission: Sign in and read user profile
      • Type: Delegated
      • Granted through: Admin consent
      • Granted by: An administrator
    • API Name: Microsoft Graph (instance 2)

      • Permission: Read directory data
      • Type: Application
      • Granted through: Admin consent
      • Granted by: An administrator
    • API Name: Intune API

      • Permission: Send device attribute to Microsoft Intune
      • Type: Application
      • Granted through: Admin consent
      • Granted by: An administrator

Common questions about the Jamf Cloud Connector

What data is shared via the Cloud Connector?

The Cloud Connector authenticates with Microsoft Azure and sends device inventory data from Jamf Pro to Azure. In addition, the Cloud Connector manages service discovery in Azure, token exchange, communication errors, and disaster recovery.

Where is device inventory data stored?

Device inventory data is stored in the Jamf Pro database.

What credentials are stored?

No credentials are stored. When configuring the Cloud Connector, admins must consent to adding the Jamf multi-tenant app and the native macOS connector app to their Azure AD tenant. Once the multi-tenant application is added, the Cloud Connector requests access tokens to interact with the Azure API. Application access can be revoked in Microsoft Azure at any time to restrict access.

Add App File For Os X To Jamf Administrator

How is data encrypted?

The Cloud Connector uses Transport Layer Security (TLS) for data sent between Jamf Pro and Microsoft Azure.

Os X 10.11.4

How does Jamf know which device is associated with which instance of Jamf Pro?

Jamf Pro uses microservices in AWS to correctly route the device information to the correct instance.

Can I switch from using the Cloud Connector to the Manual connection type?

Yes. You can change the connection type back to manual and follow the steps for manual setup. If you have questions, they should be directed to Jamf for assistance.

Permissions were modified on one or both required apps (Cloud Connector and Cloud Connector user registration app) and registration is not working, is this supported?

Modifying the permissions on the apps is not supported.

Is there a log file in Jamf Pro that shows if the Connection Type has been changed?

Yes, the changes are logged to the JAMFChangeManagement.log file. To view the Change Management logs, log in to Jamf Pro, go to Settings > System Settings > Change Management > Logs, search Object type for Conditional Access, and then click Details to view the changes.

Next steps