top of page
Search
adliporsire

Using Managed App Config with Jamf Pro: Access User and Device Information for Your Apps



You can then copy the path for an app, such as com.adobe.Adobe-Reaser/1/appconfig.xml and append it to the end of the URL to get the feed for that specific app. You can test this using -Reader/1/appconfig.xml to see output as follows.Here, note that most of these fields are key value pairs defined by Adobe (in this example at least). You can enable or disable features of Adobe Reader using these keys. The same is true with a tool like Box that might want a more granular collection of settings than a feature like Managed Open In. Once you have the XML, you can then copy it to the clipboard and paste it into the App Configuration tab of an app, as follows. Finally, Apple has sample code available at


To use Managed App Configuration, the app must be installed and/or managed through the MDM. This requires the use of license codes purchased through Apple Business Manager. It is not possible to use Managed App Configuration with apps installed through iTunes, the App Store directly on the device, or Apple Configurator.




Using Managed App Config with Jamf Pro



MDM solutions operate at the device level, communicating directly with the iOS/iPadOS operating system using standard Apple-provided APIs. When using Managed App Configuration, the MDM service sends a dictionary of settings to the app, which then applies them. This can occur either as a part of the initial app installation or later as a management command.


Other MDM providers use a standardized schema file we provide to construct a version of the app's settings menu within the MDM interface. Settings can be configured in the same way that they are inside the app via text input, selection dropdown, and toggle switch.


Most MDM providers now allow token substitution in the settings configuration. This allows a unique identifier to be set based on information the MDM is able to pull about the device, allowing for a large deployment to use unique identifiers without having to manually enter them on each device. While these may vary from vendor to vendor, they generally include:


Certain MDM providers also allow you to set up custom variables that can be defined within the MDM interface and passed to the app, which makes it easy to customize any of the app's settings for a specific device. An overview of what this looks like when using SimpleMDM is available here.


If you need to set any of these values through Managed App Configuration, you can either configure all settings manually using the template provided or you can export a settings list and copy and paste the key-value pair for that setting from the template to the configured list.


To enable plugins on macOS devices, you need to configure and deploy a managed app configuration using your device management solution. The configuration enables Okta Verify to collect trust signals from your EDR client running on the same device.


The managed app configuration contains information that Okta Verify uses to create the EDR integration plugin. Entries in the configuration correspond to the EDR vendors that you integrate with Okta. When users try to access a protected resource, Okta Verify reads the entry to collect signals from the EDR. For example, the entry for CrowdStrike looks like this:


I don't know the answer, but it looks like you might have to deploy a configuration profile. These are usually made by Apple Configurator, but I found this article with people doing it a different way.


For organizations with a lot of users, it makes sense to pre-configure the ownCloud iOS App using Mobile Device Management (MDM) suites. Already available for ownCloud Enterprise customers, those MDM settings and features now become available for organizations using the ownCloud Community Edition through the ownCloud iOS EMM App.


While many features in the ownCloud iOS apps can already be configured using the AppConfig specification, this example does not work yet. We are working on simplifying the configuration so as to make this example available with AppConfig, too! Stay tuned.


The Zscaler Client Connector can be configured and deployed with JAMF Pro on macOS devices with a few simple steps. This guide uses a cloud-hosted version of JAMF Pro v10.37.2 and deploys Zscaler Client Connector v3.6.x to a macOS computer running Monterey.


If your organization is provisioned on more than one cloud, your users will normally be prompted to select the cloud to which their traffic will be sent during the enrollment process. To avoid this prompt, you can pre-configure the Zscaler Client Connector to automatically connect to the intended cloud automatically by using this installation option.


A Configuration Profile is required to deploy the Root CA certificate to managed macOS computers for SSL inspection. If using the default Zscaler certificate, the certificate will need to be downloaded from the Zscaler Internet Access Admin UI and added to a Configuration Profile in JAMF Pro by following the below directions.


Zscaler Client Connector will now be downloaded and installed on managed macOS computers along with the Root CA certificate. After installation, Zscaler Client Connector will auto-launch and if SSO is enabled, will enroll and login the user without any user intervention.


You can configure Privacy Preferences Policy Control payload settings on Mac computers enrolled in a mobile device management (MDM) solution to manage the settings in the Privacy pane of Security & Privacy preferences. If there is more than one payload of this type, the more restrictive settings are used. Applying this payload using MDM requires supervision.


XCreds is software is a free, open source, macOS Security Agent Plugin and Menu Bar App that allows authentication and password sync with OAuth providers such as MS Azure andGoogle Identity or others. Use the package in Jamf Pro with the latest version numberTo configure XCreds for use with NC State Azure download the Jamf JSON manifest for the configuration profile from (authentication required): _duwkFBo6eU_efKv-MqnBs2Nbjft/view?usp=sharingTo learn how to use Jamf JSON Manifests see the Using JSON Profile Manifests for easy macOS Configuration section.For more details on XCreds see:


As provided, the value for CreateAdminUser setting is false and all users created will be Standard Users. Folks with technicians assisting end users should consider setting the preference CreateAdminIfGroupMember in a Profile or using:


Jamf Connect software is a commercial, for-pay, macOS Security Agent Plugin and Menu Bar App that allows authentication and password sync with OAuth providers such as Okta, MS Azure, Google Identity or others. For information on how to configure Jamf Connect at NC State University see (authentication required): _20ueXq4KZEG1w3cuPv3eAFbg/edit?usp=sharing


Instead, the two (2) methods that actually work are eithera) use a Printing configuration profile for the domain com.apple.mcx.printing like the example XML profile from OIT named Template-com.apple.mcxprinting.ncsu.mobileconfig (click to download)orb) setup the printer using the lpadmin Unix command line tool that configures CUPS after installing the additional required software packages for the printer. Starting with macOS 10.15.x Apple has restricted network printing to the ipp or ipps protocol (direct attached USB should work ongoing and smb based printing still seems to work but I would not expect it to be there in future versions of macOS.)


Again, multifunction printer with multiple output options may not work with a configuration profile alone and additional software installation may be require or more advanced methods listed in this document may be required.Always test the configuration profile method first as it is the simplest and more easily maintained.


The uuid number in the Identifier field of every configuration profile needs to be unique in all of JAMF.Generate a new uuid number by opening the Terminal. app and using the uuidgen command.The command will look something like this:$ uuidgenAA724EBA-DC4B-499E-88BC-FB66809C4CB7


So we use the open tool with the -a switch to try and open a named application and bring it to the front most window. If this fails then we run the jamf binary to execute the existing custom trigger policy.Another example:


You create groups using Jamf Pro to organize your Macs. You can use these groups to install Endpoint Protection remotely. You assign a configuration profile and installation script to groups to do this.


These steps use Jamf's Privacy Preferences Policy Control (PPPC) Utility to create a .mobileconfig file. The steps below must be performed from a Mac with the Code42 app already installed.


You can also index packages. Indexing creates a log of all the files contained within a package. This allows you to uninstall the package and view the contents of the package from Jamf Pro. Packages can only be indexed using Jamf Admin.


Click Site and choose a site.This determines which items are available in Jamf Remote.Note: This button is only displayed if you have a site configured in Jamf Pro and are logged in with a Jamf Pro user account that has full access or access to multiple sites.


Click the General tab and configure basic settings for the DMG, including the display name and category.Be sure to select the Item is a DMG with an OS X Installer, or Adobe Updater/Installer for CS3 or CS4 checkbox. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Cats and soup apk mod

Cats and Soup APK Mod: um relaxante e divertido jogo de simulação de gato Se você é um amante de gatos e está procurando um jogo que...

Tractor Simulator

Simulador de trator: uma maneira divertida e educativa de experimentar a agricultura Você já imaginou como seria dirigir um trator e...

コメント


bottom of page