Jamf Connect can enforce multifactor authentication (MFA) using your cloud identity provider (IdP). Depending on your IdP and the type of authentication used, Jamf Connect will handle MFA in one of the following ways:

  • OpenID Connect

    Jamf Connect will indirectly display any MFA challenges within a web view. The entire MFA experience is configured within your IdP's settings.

  • Okta Authentication API

    Jamf Connect presents Okta MFA challenges within the Jamf Connect UI. Some additional messaging can be customized via Jamf Connect settings to help users complete an MFA challenge.

Keep the following in mind when enabling MFA with Jamf Connect:

  • Whether MFA should be enabled at the organization, app, or user level varies by IdP and environment.

  • If configuring MFA with a third party mobile device app, make sure the app is distributed to users before or alongside Jamf Connect.

  • To ensure MFA is enforced at the login window, make sure you enable the Require Network Authentication (DenyLocal) setting in your login window configuration profile. Enabling the Allow Local Fallback (LocalFallback) setting and configuring Users with local authentication privileges (DenyLocalExcluded) to ensure users can log in without a network connection is recommended.

Note:

Jamf Connect does not currently support hardware-based security keys at the macOS Login Window. Examples of these keys include Personal Identity Verification (PIV), Common Access Card (CAC), and security keys (e.g. Yubikey) in FIDO2, U2F, or smart card mode.