JumpCloud is the only solution which can provide an authoritative directory, an IdP for SAML and device management combined in a single unified SaaS-based solution. Holistic And Neutral Solution For IAM And Device Management Pricing is based on monthly and annual subscriptions and support is extended via FAQs, knowledgebase, email, and other online measures. JumpCloud Directory-as-a-Service offers an application programming interface (API), which lets businesses integrate the system with several third-party applications such as G-Suite, Azure Active Directory, Workday, and more. Additionally, enables managers to monitor employees’ activities across multiple endpoints. JumpCloud Directory-as-a-Service provides single sign-on functionality to access various applications including Slack, Zendesk, Meraki, GitHub, Dropbox, and more. Professionals can utilize its self-service portal to execute commands across multiple servers, control file storage infrastructure, and manage users as an individual or as part of groups. The solution provides a centralized identity, which allows administrators to manage system security policies, multi-factor authentication processes, and public SSH keys. The use of these names, trademarks, and brands do not constitute an endorsement by the Acceptto Corporation.JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. Disclaimer #Īll product names, trademarks, and registered trademarks are the property of their respective owners.Īll company, product, and service names used in this document are for identification purposes only. Want to learn more about our MFA solutions? Contact our Professional Services for a Demo today. If you require assistance, please email us at Sales # If you have any problems logging into Jamf Pro with Acceptto SSO and need to edit the settings you can open the failover login page at. Select your desired method and accept the authentication request.Īfter successful authentication, you will be redirected to the Jamf Pro landing page. You will be redirected to the Acceptto SSO page.Īfter successful authentication, you’ll see the Acceptto MFA options. Open the Jamf Pro login URL through a browser of choice. Single Logout URL - The URL used to log out of your Jamf Pro instance.Assertion Consumer Service (ACS) URL - Enter the URL on the service provider to where the identity provider will redirect to with its authentication response.Name Identifier - Select " Email" from the dropdown menu. NameID Format - Select " Email address" from the dropdown menu.Sign in URL - The URL used to log in to your Jamf Pro instance.Issuer or Entity ID– Enter the EntityID of your Jamf Pro instance, which you can find in the Jamf metadata file.Under the SAML Service Provider Configuration tab, enter the following values: Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional).Out of Band Methods - Select the allowed methods for approving MFA requests.Type - Select "SAML Service Provider" from the options.Name - The application name displayed in the admin panel and application portal and used for push notifications and audit logs.In the New Application form, enter the following values under the General tab. Login to the Acceptto Dashboard with an administrative account and go to Applications.Ĭreate a new application by selecting the Create New Application. Keep the default settings in the User Mapping section.Īcceptto SAML Configuration as Identity Provider (IdP) # It should be, where myorganization is your unique identifier in Acceptto cloud. In the Identity Provider Metadata Source, select Metadata URL and paste your organization's Metadata URL on Acceptto. This is the metadata URL of Jamf Pro, and is required for the Acceptto configuration in the next section. In the Identity Provider part, select Other and type a name in the blank part. On the Single Sign-On Settings page, click Edit.Ĭheck the Enable Single-Sign-On Authentication box. Login to your Jamf Pro tenant and navigate to System Setting > Single Sign-On. Pre-Requisites #Īn Acceptto account with a configured Identity Provider and LDAP Agent (See this page for the instruction).Ī user with administrative privileges for the Jamf Pro portal.Ĭonfigure Jamf Pro as a SAML Service Provider # Acceptto integrates with Jamf Pro to improve the security of users' logins into the Jamf Pro through its Intelligent SSO-MFA solution. Jamf Pro is the Enterprise Mobility Management software that can manage an organization's Apple Ecosystem. Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only they know or have access to.
0 Comments
Leave a Reply. |