Corporate Owned Mac
  • 20 Feb 2024
  • 1 Minute to read
  • Dark
    Light
  • PDF

Corporate Owned Mac

  • Dark
    Light
  • PDF

Article Summary

The user-experience videos below demonstrate the seamless out-of-the-box experience on macOS that an end user can get when Jamf Trusted Access concepts are implemented in their organization's IT environment.

To obtain such experience the following components have been implemented:

  • Jamf Pro

  • Jamf Protect

  • Jamf Connect

  • A third-party Identity Provider (Microsoft Entra ID or Okta)

To replicate the same Trusted Access setup in your environment, follow the Trusted Access Implementation Roadmap.

Long version - MacBook experience with Microsoft Entra ID

In this video you will see:

  • Zero-touch, out-of-the-box device enrollement into Jamf Pro.

  • Local macOS account provisioning with Jamf Connect, using user credentials from Microsoft Entra ID.

  • Automatic installation of corporate apps using Jamf Pro's macOS Onboarding feature.

  • How to get instant access to restricted resources using Jamf Trust and Zero Trust Network Access.

  • Always-on blocking of malicous network traffic, whatever the entry point (browser, message, email, etc).

  • Comprehensive blocks to prevent users from accessing risky or unwanted websites.

  • Industry-leading endpoint protection blocking both known malware and malicious behaviors.

  • Conditional access capabilities continuously assessing device risk levels to protect company data.

  • Declarative Device Management Software Updates to keep devices secure at all times.


Short version - MacBook experience with Okta

In this video you will see:

  • Zero-touch, out-of-the-box device enrollement into Jamf Pro.

  • Local macOS account provisioning using user credentials from Okta.

  • Automatic installation of endpoint security protection during device inital set up.

  • Instant access to a private internal website without having to re-authenticate. Zero-touch activation coming soon!

  • Automatic deployment of a managed Exchange email account that is locked down to trusted devices only.

  • Always-on blocking of malicous network traffic, even if a user disables VPN networking manually.



Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.