Skip to content

Commit be64d1a

Browse files
authored
Merge pull request #103124 from msft-jinayoon/patch-1
Updating docs to reflect Jamf Pro 10.19
2 parents 6054907 + b844880 commit be64d1a

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

articles/active-directory/saas-apps/jamfprosamlconnector-tutorial.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ In this section, you enable Azure AD SSO in the Azure portal.
9191

9292
1. On the **Set up Single Sign-On with SAML** page, go to the **SAML Signing Certificate** section, select the **copy** button to copy **App Federation Metadata URL**, and then save it to your computer.
9393

94-
![The SAML SIgning Certificate download link](common/copy-metadataurl.png)
94+
![The SAML Signing Certificate download link](common/copy-metadataurl.png)
9595

9696
### Create an Azure AD test user
9797

@@ -100,7 +100,7 @@ In this section, you create a test user in the Azure portal called B.Simon.
100100
1. In the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
101101
1. Select **New user** at the top of the screen.
102102
1. In the **User** properties, follow these steps:
103-
1. In the **Name** field, enter `B.Simon`.
103+
1. In the **Name** field, enter `B.Simon`.
104104
1. In the **User name** field, enter [name]@[companydomain].[extension]. For example, `[email protected]`.
105105
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
106106
1. Select **Create**.
@@ -123,7 +123,7 @@ In this section, you grant B.Simon access to Jamf Pro.
123123
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user. Then, select the **Select** button at the bottom of the screen.
124124
1. In the **Add Assignment** dialog box, select the **Assign** button.
125125

126-
## Configure SSO in Jamf Pro
126+
## Configure SSO in Jamf Pro
127127

128128
1. To automate the configuration within Jamf Pro, install the **My Apps Secure Sign-in browser extension** by selecting **Install the extension**.
129129

@@ -147,30 +147,32 @@ In this section, you grant B.Simon access to Jamf Pro.
147147

148148
![The Single Sign-On page in Jamf Pro](./media/jamfprosamlconnector-tutorial/configure3.png)
149149

150-
a. Select the **Enable Single Sign-On Authentication** check box.
150+
a. Select **Edit**.
151151

152-
b. Select **Other** as an option from the **IDENTITY PROVIDER** drop-down menu.
152+
b. Select the **Enable Single Sign-On Authentication** check box.
153153

154-
c. In the **OTHER PROVIDER** field, enter **Azure AD**.
154+
c. Select **Azure** as an option from the **Identity Provider** drop-down menu.
155155

156156
d. Copy the **ENTITY ID** value and paste it into the **Identifier (Entity ID)** field in the **Basic SAML Configuration** section in the Azure portal.
157157

158158
> [!NOTE]
159159
> Use the value in the `<SUBDOMAIN>` field to complete the sign-on URL and reply URL in the **Basic SAML Configuration** section in the Azure portal.
160160

161-
e. Select **Metadata URL** from the **IDENTITY PROVIDER METADATA SOURCE** drop-down menu. In the field that appears, paste the **App Federation Metadata Url** value that you've copied from the Azure portal.
161+
e. Select **Metadata URL** from the **Identity Provider Metadata Source** drop-down menu. In the field that appears, paste the **App Federation Metadata Url** value that you've copied from the Azure portal.
162162

163-
7. On the same page, scroll down to the **User Mapping** section. Then, take the following steps.
163+
f. (Optional) Edit the token expiration value or select "Disable SAML token expiration".
164+
165+
7. On the same page, scroll down to the **User Mapping** section. Then, take the following steps.
164166

165167
![The User Mapping section of the Single Sign-On page in Jamf Pro.](./media/jamfprosamlconnector-tutorial/tutorial_jamfprosamlconnector_single.png)
166168

167-
a. Select the **NameID** option for **IDENTITY PROVIDER USER MAPPING**. By default, this option is set to **NameID**, but you can define a custom attribute.
169+
a. Select the **NameID** option for **Identity Provider User Mapping**. By default, this option is set to **NameID**, but you can define a custom attribute.
168170

169-
b. Select **Email** for **JAMF PRO USER MAPPING**. Jamf Pro maps SAML attributes sent by the IdP first by users and then by groups. When a user tries to access Jamf Pro, Jamf Pro gets information about the user from the Identity Provider and matches it against all Jamf Pro user accounts. If the incoming user account isn't found, then Jamf Pro attempts to match it by group name.
171+
b. Select **Email** for **Jamf Pro User Mapping**. Jamf Pro maps SAML attributes sent by the IdP first by users and then by groups. When a user tries to access Jamf Pro, Jamf Pro gets information about the user from the Identity Provider and matches it against all Jamf Pro user accounts. If the incoming user account isn't found, then Jamf Pro attempts to match it by group name.
170172

171173
c. Paste the value `http://schemas.microsoft.com/ws/2008/06/identity/claims/groups` in the **IDENTITY PROVIDER GROUP ATTRIBUTE NAME** field.
172174

173-
d. Select **Allow users to bypass the Single Sign-On authentication**. As a result, users won't be redirected to the Identity Provider sign-in page for authentication and can sign in to Jamf Pro directly instead. When a user tries to access Jamf Pro via the Identity Provider, IdP-initiated SSO authentication and authorization occurs.
175+
d. On the same page, scroll down to the **Security** section and select **Allow users to bypass the Single Sign-On authentication**. As a result, users won't be redirected to the Identity Provider sign-in page for authentication and can sign in to Jamf Pro directly instead. When a user tries to access Jamf Pro via the Identity Provider, IdP-initiated SSO authentication and authorization occurs.
174176

175177
e. Select **Save**.
176178

@@ -216,7 +218,7 @@ To provision a user account, take the following steps:
216218

217219
g. Select **Save**.
218220

219-
## Test the SSO configuration
221+
## Test the SSO configuration
220222

221223
In this section, you test your Azure AD single sign-on configuration by using the Access Panel.
222224

@@ -231,4 +233,3 @@ When you select the Jamf Pro tile in the Access Panel, you should be automatical
231233
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
232234

233235
- [Try Jamf Pro with Azure AD](https://aad.portal.azure.com/)
234-

0 commit comments

Comments
 (0)