JAMF Connect - Relying Party Configuration using OIDC- RSA Ready Implementation Guide
This section describes how to integrate RSA ID plus with Jamf Connect using OIDC.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Jamf Connect.
Procedure
- Sign in to RSA Cloud Administration Console.
- Select the Authentication Clients > Relying Parties menu item at the top of the page.
- Click the Add a Relying Party button on the My Relying Parties page.
- From the Relying Party Catalog select the Add button for Generic OIDC.
- On the Add OIDC Basic Information page, type a name and description for the relying party, and then click Next Step.
- On the Authentication page, select SecurID manages all authentication.
- From 2.0 Access Policy for Authentication pulldown select a policy that was previously configured, then select Next Step.
- In the Connection Profile section, provide the following information where required.
- Authorization server URL will be auto populated. This URL will be used on the JAMF Connect configuration.
- Enter Redirect URL as https://127.0.0.1/jamfconnect.
- Provide a client ID.
- Select Client Authentication Method as CLIENT_SECRET_POST.
- Enter a client secret manually or click the "Generate" button to create one automatically.
- Provide the scope as openid (scopes should be added beforehand).
- Click Save and Finish when done.
- Click Publish Changes and wait for the operation to be completed.
Configure Jamf Connect
Prerequisites
- Before you begin this guide, you need to have the latest version of Jamf Connect which is 2.45 at the time this guide was written.
- Obtain your licensed version of Jamf Connect.
- Create a code signing certificate using Jamf Pro’s CA. We will use a code signing certificate to sign the Jamf Connect configuration profile that we create later in this guide.
- Open Keychain Access located in /Applications/Utilities.
-
- Select Keychain Access > Certificate Assistant > Request a Certificate From a Certificate Authority.
-
- Configure the following:
- User Email Address: Enter your email address
- Common Name: Enter your company name. This guide will use PE-RSAReady
- CA Email Address: Leave this blank.
- Request is: Saved to Disk.
- Click Continue.
- Configure the following:
-
- Configure the following:
- Save as: CSR.txt
- Where: Desktop
- Click Save
- Configure the following:
-
- Click Done to complete the process, then navigate to your desktop and open the
CSR.txtfile using any text editor. Once opened, copy the entire contents of the CSR file. - Log in to your Jamf Pro server.
- Click Done to complete the process, then navigate to your desktop and open the
-
- From the left panel, go to Settings > Global > PKI Certificates, then select the Management Certificate Template and click Create Certificate from CSR.
-
- Configure the following:
- Paste in the CSR text that you previously copied.
- Certificate Type: Web Server Certificate
- Click Create.
- Configure the following:
-
- Select Allow at the message that will be displayed to you.
Note: After downloading the file your web browser may need to be refreshed to properly display things in Jamf Pro.
-
- The certificate will be downloaded to your Downloads folder. Move it to your desktop, then double-click the file to open it.
- Select login from the Keychain dropdown menu, and then click Add.
-
- In the Keychain Access section, select the login keychain, then locate and double-click your certificate on the right. In the window that opens, expand the Trust section to view its settings.
- Click the menu when using this certificate and select Always Trust and then close the window.
-
- When prompted, enter your administrator credentials, then click Update Settings. The certificate will now appear as trusted. You can then close Keychain Access.
Procedure
- Open the Jamf Connect Configuration App located in the Applications folder.
- Follow these steps:
- Click the Add (+) button in the bottom left corner and name the configuration as desired. In this example, it is named RSA Ready.
- Click the Identity Provider tab.
- Identity Provider: Custom
- OIDC Client ID: Paste the client ID that was set up in the RSA Cloud Authentication Service configuration.
- OpenID connect scopes: Enter the scopes defined in the RSA Cloud Authentication Service configuration. In this case, use openid as the scope.
- Client secret: Paste the client secret that was set up in the RSA Cloud Authentication Service configuration.
- Tenant: Paste the Authorization Server Issuer URL that was set up in the RSA Cloud Authentication Service configuration.
- OIDC Redirect URI: https://127.0.0.1/jamfconnect
- Discovery URL: This URL follows the format https://<Authorization Server Issuer URL>/.well-known/openid-configuration
-
- From the top right corner, click the Test button. Select OIDC from the menu.
- Enter the User ID and password for one of the accounts in RSA, then click Submit.
- If all went well, you will be greeted with the message below. Close this window to return to the Jamf Connect Configuration app.
- Select the Login tab, then configure the following:
- Initial Password: Select the check box next to Create a separate local password.
- Keychain: Make sure this is enabled.
- Click the Save button at the top.
- Configure the following:
- Application: Confirm Jamf Connect Login is selected
- File Format: Confirm configuration Profile .mobileconfig is selected
- Organization: Enter your organization name.
- Payload Name: Jamf Connect Login
- Signing Identity: Select the signing certificate created earlier in the prerequisite section.
- Click Save.
- A prompt will appear requesting administrative credentials to sign the configuration profile. Enter the credentials and click Allow. This prompt will appear a second time—enter the credentials again and click Allow.
- Enter the following:
- Save As: Jamf Connect Login
- Where: Desktop
- Click Save
- Click OK at the message that will appear.
- Double-click the Jamf Connect Login.mobileconfig profile file saved on the Desktop to begin installation.
- Click System Settings located in the Apple icon menu.
- In System Settings, search for Profiles and click the result.
- The Jamf Connect profile will appear as pending installation. Double-click it, then click Install in the pop-up window that appears.
- Enter your administrative credentials then click OK. The Jamf Connect Login configuration profile is now installed.
User Experience
- Log out of the Mac computer after configuring Jamf Connect. If the setup was successful, the Jamf Connect Login window will appear.
- Enter the User ID and password for one of the accounts in RSA, then click Submit.
- Verify your password again and then click Log in.
The configuration is complete.
Related Articles
JAMF Connect - My Page SSO Configuration using OIDC- RSA Ready Implementation Guide 8Number of Views JAMF Connect - RSA Ready Implementation Guide 10Number of Views Manage OIDC Claims and Scopes 85Number of Views OIDC: The request could not be processed at this time when testing Anypoint Platform with the RSA Cloud Authentication Ser… 27Number of Views Cloud Access Service - Relying Parties 11Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?