• Link PingOne to an identity repository containing the users requiring application access.
  • Populate Jamf Pro with at least one user to test access.
  • You must have administrative access to PingOne.
  1. Add the Jamf Pro application to PingOne:
    1. Sign on to PingOne for Enterprise and go to Applications > My Applications.
    2. On the SAML tab, click Add Application.
      The My Applications page with the SAML tab selected. The Add Application list is open with New SAML Application selected.
    3. Enter Jamf Pro as the application name.
    4. Enter a suitable description.
    5. Choose a suitable category.
    6. Click Continue to Next Step.
    7. Enter the following values.
      Field Value

      Assertion Consumer Service (ACS)

      https://<your instance>.jamfcloud.com/saml/SSO

      Entity ID

      https://<your instance >.jamfcloud.com/saml/metadata

      Single Logout (SLO) Endpoint

      https://<your instance>.jamfcloud.com/saml/SingleLogout

      Single Logout Binding Type

      POST


      Screen capture of the SAML metadata fields in PingOne for Enterprise with the SAML Metadata, Assertion Consumer Service, Entity ID, and Single Logout Endpoint fields highlighted in red.
    8. On the SAML Metadata line, click Download.
    9. Click Continue to Next Step.
    10. Click Add new attribute.
      Screen capture of the SSO Attribute Mapping section with the Add new attribute button highlighted in red.
    11. Add the SAML_SUBJECT attribute and map it to your email attribute.
      Screen capture of the SSO Attribute Mapping section with the Application Attribute and the Identity Bridge Attribute or Literal Value fields highlighted in red.
    12. Click Continue to Next Step.
    13. Click Add for each user groups that should have access to JAMF Pro.
      Screen capture of the Group Access section with two Group Name search field and the Group Name results field.
    14. Click Continue to Next Step.
    15. Click Finish.
  2. Add the PingOne connection to JAMF Pro:
    1. Sign on to the Jamf Pro console as an administrator.
    2. Click the Gear icon.
      Screen capture of the Jamf Pro console Gear icon highlighted in red.
    3. Go to System Settings > Single Sign-On.
      Screen capture of the Jamf Pro console with the System Settings and Single Sign-On sections highlighted in red.
    4. Click the Edit icon.
      Screen capture of the Edit icon highlighted in red.
    5. Select the Enable Single Sign-On Authentication check box.
      Screen capture of the Jamf Pro console with the Enable Single Sign-On Authentication check box highlighted in red.
    6. In the Identity Provider list, select PingIdentity.
    7. Confirm that the Entity ID value matches the value you set previously in PingOne.
    8. In the Upload Metadata File section, upload the PingOne metadata file.
      Screen capture of the Single Sign-On System Settings in Jamf Pro console with the Identity provider list, the Entity ID field, and the Upload Metadata File fields highlighted in red.
    9. In the Jamf Pro User Mapping section, click Email.
      Screen capture of the Jamf Pro User Mapping section with the Email button highlighted in red.
    10. In the Single Sign-On Options for Jamf Pro section, select the Allow users to bypass the Single Sign-On authentication check box.
      Screen capture of the Jamf Pro Single Sign-On Options section with the Allow users to bypass the Single Sign-On authentication check box highlighted in red.
    11. Click Save.
  3. Test the PingOne identity provider (IdP):
    1. Go to your Ping desktop as a user with Jamf Pro access.
      Note:

      To find the Ping desktop URL, in the PingOne admin console, go to Setup > Dock > PingOne Dock URL.

    2. Complete the PingOne authentication.
      Screen capture of the Jam Pro application home page.

      You're redirected to your Jamf Pro application.

  4. Test the PingOne service provider (SP):
    1. If you are using PingOne as the standard authentication method for Jamf Pro access, sign on to the Jamf Pro console as an administrator after you've completed PingOne IdP testing.
    2. Go to Settings > System Settings > Single Sign-On and click Edit.
      Screen capture of the Edit icon highlighted in red.
    3. Clear the Allow users to bypass the Single Sign-On authentication check box.
      Screen capture of the Single Sign-On Options for Jamf Pro section with the Allow users to bypass the Single Sign-On authentication check box highlighted in red.
    4. Click Save.
    5. Go to your Jamf Pro application.
      Screen capture of the Jamf Pro application home page.

      You're redirected to PingOne.

    6. Enter your PingOne username and password.

      After successful authentication, you're redirected back to Jamf Pro.