Skip to content

Commit c9c3521

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/memdocs (branch main)
2 parents 860dfd4 + a44f5ba commit c9c3521

1 file changed

Lines changed: 19 additions & 7 deletions

File tree

memdocs/intune/protect/conditional-access-integrate-jamf.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ You need the following to configure Conditional Access with Jamf Pro:
4949

5050
- Jamf Pro 10.1.0 or later
5151
- Microsoft Intune and Microsoft AAD Premium P1 licenses (recommended Microsoft Enterprise Mobility + Security license bundle)
52+
- Global admin role in Azure Active Directory.
5253
- A user with Microsoft Intune Integration privileges in Jamf Pro
5354
- [Company Portal app for macOS](https://aka.ms/macoscompanyportal)
5455
- macOS devices with OS X 10.12 Yosemite or later
@@ -107,12 +108,19 @@ To connect Intune with Jamf Pro:
107108
8. Next, we will add permissions to update device attributes. At the top left of the **API permissions** page, select **Add a permission** to add a new permission.
108109

109110
9. On the **Request API permissions** page, select **Intune**, and then select **Application permissions**. Select only the check box for **update_device_attributes** and save the new permission.
111+
10. Under **Microsoft Graph**, select **Application permissions**, then select **Application.Read.All**.
110112

111-
10. Next, grant admin consent for this app by selecting **Grant admin consent for _\<your tenant>_** in the top left of the **API permissions** page. You may need to re-authenticate your account in the new window and grant the application access by following the prompts.
113+
11. Select **Add permissions**.
112114

113-
11. Refresh the page by click on the **Refresh** button at the top of the page. Confirm that admin consent has been granted for the **update_device_attributes** permission.
115+
12. Navigate to **APIs my organization uses**. Search for and select **Windows Azure Active Directory**. Select **Application permissions**, and then select **Application.Read.All**.
114116

115-
12. After the app is registered successfully, the API permissions should only contain one permission called **update_device_attributes** and should appear as follows:
117+
13. Select **Add permissions**.
118+
119+
14. Next, grant admin consent for this app by selecting **Grant admin consent for _\<your tenant>_** in the top left of the **API permissions** page. You may need to re-authenticate your account in the new window and grant the application access by following the prompts.
120+
121+
15. Refresh the page by selecting **Refresh** at the top of the page. Confirm that admin consent has been granted for the **update_device_attributes** permission.
122+
123+
16. After the app is registered successfully, the API permissions should only contain one permission called **update_device_attributes** and should appear as follows:
116124

117125
![Successful permissions](./media/conditional-access-integrate-jamf/sucessfull-app-registration.png)
118126

@@ -135,10 +143,14 @@ The app registration process in Azure AD is complete.
135143

136144
1. Activate the connection in the Jamf Pro console:
137145

138-
1. Open the Jamf Pro console and navigate to **Global Management** > **Conditional Access**. Click the **Edit** button on the **macOS Intune Integration** tab.
139-
2. Select the check box for **Enable Intune Integration for macOS**.
140-
3. Provide the required information about your Azure tenant, including **Location**, **Domain name**, the **Application ID**, and the value for the *client secret* that you saved when you created the app in Azure AD.
141-
4. Select **Save**. Jamf Pro tests your settings and verifies your success.
146+
1. Open the Jamf Pro console and navigate to **Global Management** > **Conditional Access**. Select **Edit** on the **macOS Intune Integration** tab.
147+
2. Select the check box for **Enable Intune Integration for macOS**. When this setting is enabled, Jamf Pro sends inventory updates to Microsoft Intune. Clear the selection if you want to disable the connection but save your configuration.
148+
3. Select **Manual** under **Connection type**.
149+
4. From the **Sovereign Cloud** pop-up menu, select the location of your Sovereign Cloud from Microsoft.
150+
5. Select **Open administrator consent URL** and follow the onscreen instructions to allow the Jamf Native macOS Connector app to be added to your Azure AD tenant.
151+
6. Add the **Azure AD Tenant Name** from Microsoft Azure.
152+
7. Add the **Application ID** and **Client Secret** (previously called Application Key) for the Jamf Pro application from Microsoft Azure.
153+
8. Select **Save**. Jamf Pro tests your settings and verifies your success.
142154

143155
Return to the **Partner device management** page in Intune to complete the configuration.
144156

0 commit comments

Comments
 (0)