API Interfaces
- 13 Feb 2024
- 1 Minute to read
- DarkLight
- PDF
API Interfaces
- Updated on 13 Feb 2024
- 1 Minute to read
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Many organizations have built custom workflows that operate based upon a given device's state, health, or risk level.
While Jamf Trusted Access provides first party risk-based access controls, there are many custom workflows our customers have imagined that require endpoint metadata to drive.
The below APIs are available for internal developers to adopt to build these custom workflows:
- Jamf Pro APIs: macOS & iOS/iPadOS device management and asset information
- Move Apple device into specific group for scoping of remediation policy/profile
- Remotely wipe/lock Apple device or set iOS/iPadOS Lost Mode
- Remove access to corporate networks or apps
- Jamf Protect API:
- macOS endpoint security threat alerts
- macOS computer details as viewed from Jamf Protect agent
- set custom prevent list for macOS endpoints
- Jamf Security Cloud Risk API
- iOS/iPadOS and Android endpoint risk data
- macOS, iOS/iPadOS, Android, and Windows threat events
- Custom Risk-level overrides (All platforms)