Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Add Jamf Pro install docs [CON-198] #368

Merged
merged 9 commits into from
Jan 7, 2025
Merged

Add Jamf Pro install docs [CON-198] #368

merged 9 commits into from
Jan 7, 2025

Conversation

tashian
Copy link
Contributor

@tashian tashian commented Jan 6, 2025

No description provided.

Verified

This commit was signed with the committer’s verified signature.
tashian Carl Tashian
@tashian tashian requested a review from a team as a code owner January 6, 2025 23:49
@tashian tashian enabled auto-merge January 6, 2025 23:50

Verified

This commit was signed with the committer’s verified signature.
tashian Carl Tashian
Comment on lines +175 to +181
"property_order": 10
},
"Certificate": {
"type": "string",
"title": "Smallstep (Debug): Certificate URI",
"description": "A KMS URI that points to a certificate that can be used for agent bootstrapping.",
"property_order": 10
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are the order indices the same intentionally?


- Read Mobile Devices
- Read Computers
- Webhooks: Create, Delete, Read, Update
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is currently not required, as we're not creating webhooks programmatically (at least not yet, afaik). I guess it's fine for future use cases, and so users don't need to update it.

tashian and others added 6 commits January 7, 2025 10:39

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Co-authored-by: Herman Slatman <hslatman@users.noreply.github.com>

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Co-authored-by: Herman Slatman <hslatman@users.noreply.github.com>

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Co-authored-by: Herman Slatman <hslatman@users.noreply.github.com>

Verified

This commit was signed with the committer’s verified signature.
tashian Carl Tashian

Verified

This commit was signed with the committer’s verified signature.
tashian Carl Tashian
…carl/jamf-pro

Verified

This commit was signed with the committer’s verified signature.
tashian Carl Tashian
Smallstep uses Dynamic SCEP certificate enrollment. This webhook allows Jamf to request a dynamic, short-lived challenge string from Smallstep during MDM enrollment. The challenge string is injected into a [SCEP payload](https://developer.apple.com/documentation/devicemanagement/scep) for your clients to authenticate to Smallstep.
Smallstep uses Dynamic SCEP certificate enrollment. This webhook allows Jamf to request a dynamic, short-lived challenge string from Smallstep during a SCEP certificate request. The challenge string is injected into a [SCEP payload](https://developer.apple.com/documentation/devicemanagement/scep) for your clients to authenticate to Smallstep.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hslatman does this look more accurate?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, much better.

Technically, it'll be retrieved before the request, but it's fine in this context.

To make it more clear why SCEP is needed at all, maybe in the first line it needs something along the lines of Smallstep issues certificates using Dynamic SCEP (a.o.). Not thrilled by the "a.o.", so maybe something else, but I think it should somehow indicate that it's only used for specific use cases, and that it's not the only way certificates will be issued.

Copy link
Contributor Author

@tashian tashian Jan 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point. I did one more round on this, to put SCEP into context a bit better.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking good 👍

@tashian tashian requested a review from hslatman January 7, 2025 19:41
@tashian
Copy link
Contributor Author

tashian commented Jan 7, 2025

@joshdrake any feedback on Herman's comments?

@tashian tashian changed the title Add Jamf Pro tutorial [CON-198] Add Jamf Pro install docs [CON-198] Jan 7, 2025

Verified

This commit was signed with the committer’s verified signature.
tashian Carl Tashian
3. Add a new **Policy**
1. Under Options → General:
- Display name: Smallstep Agent
- Trigger: Login
Copy link
Contributor Author

@tashian tashian Jan 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@joshdrake is Login still the correct trigger? Or should this be set to Recurring Check-in? The note below suggests it should be Recurring Check-in.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tashian I'm not actually sure what operators would typically use for ensuring software installs. I suppose "Recurring Check-In" is better in that it does not require a restart/relog to evaluate the policy.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok I'll add a PR to update it

@tashian tashian requested a review from joshdrake January 7, 2025 21:47
@tashian tashian merged commit c00756e into main Jan 7, 2025
1 check passed
@tashian tashian deleted the carl/jamf-pro branch January 7, 2025 23:22
@joshdrake
Copy link
Contributor

Outside of the comment re: policy trigger, this lgtm!

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants