Architecture
  • 09 Mar 2023
  • 1 Minute to read
  • Dark
    Light
  • PDF

Architecture

  • Dark
    Light
  • PDF

Article summary

Jamf Trusted Access is a solution built upon various Jamf management and security products, with third-party products and integrations added as necessary to support endpoint platforms and capabilities that are not natively supported by Jamf.


To fully achieve the outcomes delivered through the implementation of Trusted Access, an organization must utilize the Jamf products as indicated in the above architecture. Omitting or substituting Jamf products will result in significant gaps in security, functionality, and user experience that negate many of the benefits offered by Trusted Access.

See our implementation roadmap to understand how to tackle this architecture in manageable phases.

 


Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.