

Enter a value in Description, select any option for Expires and choose Add.īefore you leave this page, copy the value for the client secret and record it for later use. Select Certificates & secrets under Manage. You'll need this value in later procedures. On the app Overview page, copy the Application (client) ID value and record it for later use. Select Register to create the application and to open the Overview page for the new app. For Redirect URI, leave the default of Web, and then specify the URL for your Jamf Pro instance.For the Supported account types section, select Accounts in any organizational directory.In the Name section, enter a meaningful application name, for example Jamf Conditional Access.

On the Register an application page, specify the following details: In the Azure portal, go to Azure Active Directory > App Registrations, and then select New registration. Configure Conditional Access in Jamf Pro.Ĭreate an application in Azure Active Directory.Enable Intune to integrate with Jamf Pro.
#Jamf pro force check in software
#Jamf pro force check in license

Intune's compliance engine then analyzes the inventory data to generate a report. When Jamf Pro integrates with Intune, you can sync the inventory data from macOS devices with Intune, through Azure AD. Resource access is controlled by your Azure Active Directory (Azure AD) Conditional Access policies in the same way as for devices managed through Intune. Through integration, you can require that your macOS devices that are managed by Jamf Pro meet your Intune device compliance requirements before those devices are allowed to access your organization's resources. Microsoft Intune supports integrating your Jamf Pro deployment to bring device compliance and Conditional Access policies to your macOS devices.
