API Interfaces
  • 13 Feb 2024
  • 1 Minute to read
  • Dark
  • PDF

API Interfaces

  • Dark
  • PDF

Article summary

Many organizations have built custom workflows that operate based upon a given device's state, health, or risk level.

While Jamf Trusted Access provides first party risk-based access controls, there are many custom workflows our customers have imagined that require endpoint metadata to drive.

The below APIs are available for internal developers to adopt to build these custom workflows:

  • Jamf Pro APIs: macOS & iOS/iPadOS device management and asset information
    • Move Apple device into specific group for scoping of remediation policy/profile
    • Remotely wipe/lock Apple device or set iOS/iPadOS Lost Mode
    • Remove access to corporate networks or apps
  • Jamf Protect API:
    • macOS endpoint security threat alerts
    • macOS computer details as viewed from Jamf Protect agent
    • set custom prevent list for macOS endpoints
  • Jamf Security Cloud Risk API
    • iOS/iPadOS and Android endpoint risk data
    • macOS, iOS/iPadOS, Android, and Windows threat events
    • Custom Risk-level overrides (All platforms)

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.