- 24 Sep 2022
- 2 Minutes to read
- DarkLight
- PDF
User-Only Enrollments
- Updated on 24 Sep 2022
- 2 Minutes to read
- DarkLight
- PDF
There are occasional scenarios in which establishing device management on a device that needs access to organizational resources is not possible. This includes:
- Contractor devices in which device management is bound to another device management instance.
- BYO Mac / BYO PC scenarios where device management cannot be deployed due to privacy reasons.
If access to data resources are extended to unmanaged devices, you significantly decrease the efficacy of the Trusted Access security model for those data.
By no longer requiring a sanctioned or safe device to access that data resource, the resource is necessarily available to any device, making it far more vulnerable to user credential-based attacks.
If you do use this method, be mindful of the sensitivity of the data being exposed and define access to user-only enrolled devices as narrowly as possible.
With this enrollment method, a user installs Jamf Trust and activates it using their IdP credentials. Data resources are then available to the user and device based upon their assigned Access Policies.
Enable User-Only Data Access via Jamf Trust
Configuration of this deployment model involves configuring Identity-based Enrollments, enabling devices without management to activate the Jamf Trust using IdP credentials only.
- Follow the steps in Enabling Access for Trusted Devices to configure Private Access in RADAR, with the following modifications:
- Create a new Activation Profile titled
Unmanaged Devices
with the following configurations:- Set the Device Group to a new group named
Unmanaged User-Only Devices
- Select the identity provider users of this activation profile is to use.
- For Capabilities minimally select Zero Trust Network Access.
- Set the Device Group to a new group named
- Configure Identity-Based Provisioning for the just created
Unmanaged Devices
activation profile. - Modify your Access Policies in RADAR as follows:
- For sensitive applications, make sure
Everyone
is NOT selected in the policy's Users and Groups configuration. - For applications that should be accessible to User-Only devices, select the Limited option for Users and Groups and be sure to include the
Unmanaged User-Only Devices
group created above. - It is STRONGLY recommended that access policies available to the
Unmanaged User-Only Devices
are configured with any subnet-wide traffic definitions (e.g./24
) in the Traffic Matching configuration.
- For sensitive applications, make sure
- Create a new Activation Profile titled
Users can now download the Jamf Trust app from their platform's public App Store (or here for Windows) then sign on with their IdP credentials as prompted. The app will activate and networking access will be available to the applications configured in Access Policies for the device.
Access can be revoked from the user at any time by deleting their device entry in RADAR > Devices > Manage. Note the user will be able to re-enroll if their credentials are still valid and your identity provider integration configuration permits it.