Okta

How to Configure SAML 2.0 for JAMF Software Server (JSS)

Contents


Supported Features

The Okta/JAMF Software Server (JSS) SAML integration currently supports the following features:


Configuration Steps

  1. Login to your JAMF Software Server (JSS) account as administrator.

  2. Click on the gear icon at the top-right corner, then select Single Sign-On:

    jamf_new1.png

  3. Click Edit, then enter the following (see screen shot at the end of step for reference):

    • Select the Jamf Pro Server checkbox.

    • USER MAPPING: SAML: Select NameID.

    • USER MAPPING: JAMF PRO: This value has to match the Application username from Okta. By default, it is set to Username.

    • GROUP ATTRIBUTE NAME: Copy and paste the following:

      http://schemas.xmlsoap.org/claims/Group
    • IDENTITY PROVIDER: Select Okta.

    • IDENTITY PROVIDER METADATA SOURCE: Copy and save the following as metadata.xml. Select Metadata file, then upload the saved file.

      Sign in to Okta Admin app to have this variable generated for you.
    • ENTITY ID: Enter the following (with your own JSS Domain):

      https://[your-jss-domain]/saml/metadata
    • Click Save.

    jamf_new2.png

  4. Optional: Group Attribute Steps:

    • To send groups as a part of SAML assertion, in Okta select the Sign On tab for the JAMF Software Server (JSS) app, then click Edit.

    • Select the appropriate filter from the drop-down menu, then type the preferred value into the field.

    • Click Save.

    jamf_new3.png

  5. Done!


Notes

The following SAML attributes are supported:

For SP-initiated flows