Using JAMF
Last updated
Last updated
JAMF simplifies mass-installation of the dope.endpoint on Mac. This removes all manual steps: trusting the Certificate and accepting system extension permissions.
There are two primary components:
MDM Profile: this is the config profile that contains the certificate, extension, VPN, and privacy permission to ensure the user will never see a pop-up. Otherwise, there will be manual interaction for accepting/authorizing the installation (due to Apple security policies)
Managed Installation: this is where you upload the full zip to JAMF to deploy to your devices - same steps as any managed deployment (upload the install zip as-is). Once distributed, JAMF will run the installer
Known JAMF Issues outside of dope.security control:
JAMF documentation mentions that .zip is not supported, but it works perfectly fine
JAMF can be intermittently slow and will display an Availability Pending message. It can take up to an hour to process
MobileConfig
FileYou can retrieve the MDM profile's XML here and directly upload it to JAMF. This will contain all requisite permissions at once, including:
Root Certificate - for trusting the on-device SSL inspection
Network Extension Permission - for re-routing traffic to the on-device proxy
VPN Permission - for re-routing traffic to the on-device proxy
Privacy Preferences Permission - for anti-tampering
After uploading it to JAMF, you will have the full profile available to target and deploy to devices.
Take your new profile scope, click Scope, and target it to your endpoints:
Add the target machines you want to distribute to.
The profile should have 4 items (certificate, system extension, vpn, and privacy preferences):
Create a JAMF package deployment and upload the installation .zip
. Recall, it includes:
Installer .pkg
(Universal binary supports both Intel & Arm)
agent_parameters.json
Certificate
JAMF documentation does not explicitly say that .zip is supported, however you can directly upload the .zip to JAMF without issues
Scope the target machines you want to install to and send. Target machines will pick up, install the dope.security package, and require no manual intervention.
The next step on the target machines will be to authenticate using Google or O365.