API Interfaces
  • 23 Sep 2022
  • 1 Minute to read
  • Dark
  • PDF

API Interfaces

  • Dark
  • PDF

Article Summary

Many organizations have built custom workflows that operate based upon a given device's state, health, or risk level.

While Jamf Trusted Access provides first party risk-based access controls, there are many custom workflows our customers have imagined that require endpoint metadata to drive.

The below APIs are available for internal developers to adopt to build these custom workflows:

  • Jamf Pro APIs: macOS & iOS/iPad OS device management and asset information
  • Jamf Protect API: macOS endpoint security
  • Jamf Security Cloud Risk API (requires login)
    • iOS/iPadOS and Android endpoint risk data
    • macOS, iOS/iPadOS, Android, and Windows threat events
    • Custom Risk-level overrides (All platforms)

Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.