Skip to main contentSkip to search
Powered by Zoomin Software. For more details please contactZoomin
Jamf Learning HubJamf Learning Hub
Learning Hub
Jamf Learning Hub
  • Home
  • Publications
  • EnglishDeutschEspañolFrançais日本語Nederlands繁體中文
  • Login

Technical Paper: Integrating AWS Verified Access with Jamf Device Identity

Integrating AWS Verified Access with Jamf Device Identity

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Expand All
Print
Contents
  • Integrating AWS Verified Access with Jamf Device Identity
  • Key Concepts of the AWS Verified Access and Jamf Device Identity Integration
  • Requirements for Integrating AWS Verified Access with Jamf Device Identity
  • Creating an AWS Verified Access Activation Profile
  • Deploying Jamf Trust for macOS Using Jamf Pro
  • Deploying the Jamf Trust Configuration Profile Using Jamf Pro
  • Deploying AWS Verified Access Browser Extensions
  • Deploying the Connectivity Client for AWS Verified Access with Jamf Pro
  • Viewing AWS Verified Access Details in Jamf Security Cloud
  • Copyright and Trademarks
Table of Contents

Integrating AWS Verified Access with Jamf Device Identity

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Expand All
Print
  • Last UpdatedJul 24, 2025
  • 1 minute read
    • Technical Documentation

About This Guide

This guide is designed for IT administrators and provides instructions for integrating and deploying Amazon Web Services (AWS) Verified Access on Mac computers with Jamf Device Identity using zero-touch deployment.

Getting Started

Learn about this integration and its requirements.

  • Key Concepts of the AWS Verified Access and Jamf Device Identity Integration
  • Requirements for Integrating AWS Verified Access with Jamf Device Identity

Integration Workflow

Set up Jamf Trust and AWS Verified Access prior to the integration using these steps:

  1. Creating an AWS Verified Access Activation Profile

  2. Deploying Jamf Trust for macOS Using Jamf Pro

  3. Deploying the Jamf Trust Configuration Profile Using Jamf Pro

After setting up AWS Verified Access and deploying Jamf Trust, use these steps to establish and monitor the integration:

  1. Deploying AWS Verified Access Browser Extensions

  2. Deploying the Connectivity Client for AWS Verified Access with Jamf Pro

  3. Viewing AWS Verified Access Details in Jamf Security Cloud

Additional Resources

Explore additional resources from Jamf, Amazon, the community, and Apple.

  • Jamf Security Cloud Portal Setup Guide
  • Jamf Pro Documentation
  • Getting Started with AWS (Amazon)

For an enhanced experience and access to additional features, log in to the Jamf Learning Hub with your Jamf ID.

Login
Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. Learn about Jamf.
Quick Links
  • Jamf Support
  • Training & Certifications
  • Jamf Account
  • Jamf Resources
  • Jamf Integrations
  • Jamf Blog
  • Jamf Nation
  • Marketplace
  • Become a Partner
  • Find a Partner
Solutions
  • The Jamf platform
  • Zero-touch deployment
  • Mobile Device Management (MDM)
  • Application management
  • Inventory management
  • Self Service
  • Identity and access management
  • Endpoint protection
  • Threat prevention and remediation
  • Content filtering and safe internet
  • Zero Trust Network Access (ZTNA)
  • Security visibility and compliance
  • CookiesCopyrightPrivacyTerms of UseTrustModern Slavery Act StatementTwitterLinkedInYouTubeInstagramFacebook
TitleResults for “How to create a CRG?”Also Available inAlertDownload