Skip to main contentSkip to search
Powered by Zoomin Software. For more details please contactZoomin
Jamf Learning HubJamf Learning Hub
Learning Hub
Jamf Learning Hub
  • Home
  • Publications
  • EnglishDeutschEspañolFrançais日本語Nederlands繁體中文
  • Login

Jamf Security Cloud Portal Setup Guide

Activation Profile Settings

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Expand All
Print
Contents
  • Jamf Security Cloud Portal Setup Guide
  • Setting Up Your Portal
    • Creating Administrator Accounts
      • Jamf Security Cloud Account Types and Permissions
      • Single Sign-On (SSO) in Jamf Account
      • Enabling Two-Factor Authentication
      • Multi-Portal Administration
    • Security Standards
    • Network Communication
    • Permitting Inbound/Outbound Traffic
    • Complying with GDPR Requests
  • The Jamf Security Cloud Dashboard
  • Reports
  • Device Management
    • Activation Profiles
      • Creating an Activation Profile
      • Activation Profile Settings
        • Traffic Vectoring Options with Jamf Security Cloud
        • Enabling Identity-Based Provisioning
        • Restricting iCloud Private Relay for Supervised Apple Devices
    • Creating Device Groups
    • Device Statuses
    • Removing Devices
  • Distribution Methods for the Jamf Trust App
    • Mitigating Tampering with the Jamf Trust App on iOS and iPadOS
    • Managed Distribution Guides for Apple and Android
      • Jamf Pro
        • Distributing to iOS and iPadOS
        • Distributing to macOS
      • Jamf School
        • Distributing to iOS and iPadOS
        • Distributing to macOS
      • Jamf Now
        • Distributing to iOS and iPadOS
        • Distributing to macOS
          • Uploading and Deploying a macOS Activation Profile using Jamf Now
      • Microsoft Intune
        • Distributing to iOS and iPadOS
        • Distributing to macOS
        • Distributing to Android
      • Workspace ONE
        • Distributing to iOS and iPadOS
        • Distributing to Android
      • Ivanti Neurons
        • Distributing to iOS and iPadOS
        • Distributing to Android
      • Ivanti Endpoint Manager Mobile
        • Distributing to iOS and iPadOS
        • Distributing to Android
      • IBM MaaS360
        • Distributing to iOS and iPadOS
          • Uploading and Deploying an iOS and iPadOS Activation Profile using IBM MaaS360
        • Distributing to Android
          • Configuring the Jamf Trust Block Page for Android using IBM MaaS360
      • Citrix Endpoint Management
        • Distributing for iOS and iPadOS
        • Distributing to Android
      • BlackBerry UEM
        • Distributing to iOS and iPadOS
        • Distributing to Android
      • Migrating Samsung Devices From Cloud Proxy to Secure DNS Traffic Vectoring
      • Migrating Apple Mobile Devices From Cloud Proxy to Secure DNS and On-Device Traffic Vectoring
    • Managed Distribution Guides for Windows
      • Preparing for Windows Distribution
        • Configuring Windows to Support Split-Horizon DNS
        • Configuring Windows to Support a Proxy
      • Microsoft Intune
      • Microsoft Configuration Manager
      • Workspace ONE
      • Other UEM or MDM Solutions
      • Jamf Trust for Windows End User Experience
      • Windows Management and Distribution Troubleshooting
        • Reactivating Jamf Trust on Devices for Windows
        • Removing Jamf Trust from a Windows device
        • Windows Agent Metered Network Settings
        • Enabling Jamf Trust App Update Notifications for Windows
    • Distributing the Jamf Trust App Using a Shareable Link
    • Deploying Jamf Trust to an Individual Device
    • Deploying Jamf Trust to Multiple Devices Using CSV Files
    • Deploying Jamf Trust to Unmanaged Windows Devices
    • Jamf Trust for macOS URL Schemes
    • Zero Touch App Activation with Jamf Connect and Jamf Trust
  • Policies
  • Portal Integrations
    • UEM Connect
      • UEM Connect Settings Reference
      • UEM Connect Integration by Vendor
        • Jamf Pro
        • Jamf School
        • Microsoft Intune
          • Configuring Conditional Access for Microsoft Intune
          • App Protection Policies on Managed or Unmanaged Devices
        • Workspace ONE
        • IBM MaaS360
        • Citrix
        • Ivanti
          • Ivanti Cloud
          • Ivanti Core
    • Manager for Android
      • Manager for Android Requirements
      • Setting Up Manager for Android
      • Getting Started with Manager for Android
      • Enrolling Android Devices with Manager for Android and Jamf Security Cloud
      • Manager for Android Connection Settings in Jamf Security Cloud
    • Shared Signals Framework for Jamf Security Cloud
    • Identity Provider Integrations
      • Integration Methods
      • Microsoft Entra ID
        • Using Entra Admin Consent Activation Links
        • Entra ID SSO Permissions
      • Okta
      • Google
      • Federated Identity Providers
        • Identity Provider Federation with Microsoft Entra ID
          • Identity Providers that Can Be Federated with Entra ID
        • Verifying Federated Identity Provider Compatibility with Entra ID
        • Federating Google Workspace with Entra ID
        • Creating an Entra ID Account for Federation
    • Custom DNS
      • DNS Zones
      • Search Domain
      • Hostname Mapping Using Jamf Security Cloud
  • Notifications
    • Service Notifications
    • Push Templates
      • Creating a Custom Push Notification
      • Push Template Variables
    • Block Pages
  • Organization Units in Jamf Security Cloud
    • Organization Unit Hierarchy, Inheritance, and Overrides
  • Service Controls
    • Service Controls for iOS
      • Default Traffic Vectoring (iOS Only)
      • Auto Launch (iOS Only)
      • VPN On-Demand Assist (iOS Only)
    • Privacy
    • Dynamic Routing
      • Configuring Split-Tunnel VPN Interoperability
      • Configuring Destination-Based Proxy Bypass
      • Dynamic Routing Configuration Options
    • APN Preferences
    • Cloud Proxy IP Addresses
      • Exporting Cloud Proxy IP Addresses
      • Subscribing to Cloud Proxy IP Addresses Change Notifications
  • Copyright and Trademarks
Table of Contents

Activation Profile Settings

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Expand All
Print
  • Last UpdatedSep 25, 2025
  • 5 minute read
    • Jamf Connect
    • Jamf Protect
    • Technical Documentation

Service Capabilities

Available capabilities depend on which security products your organization subscribes to and may include all or some of the following:

Network access
Provides secure access to your organization's resources using Jamf Connect's Zero Trust Network Access
Content controls
Manages network activity using Jamf Protect's internet content filtering and usage controls
Network security
Protects your network connections from cyber threats
Employee Badge
Enables mobile devices to act as passes for accessing offices and other locations. For more information, see Technical Paper: Deploying Employee Badge for Jamf Trust.
Device identity
Enables requirements that devices must meet to access the organizations resources. For more information, see Technical Paper: Integrating AWS Verified Access with Jamf Device Identity.

Traffic Vectoring

Traffic vectoring determines how data collected by enrolled devices is routed. Available options depend on which service capabilities are selected in your activation profile.

Enable network compatibility mode
Allows you to deploy the on-device content filter without Secure DNS.
Use cloud proxy instead of DNS
Allows you to choose between cloud proxy or DNS. DNS is used by default for all supported platforms. Cloud proxy is only supported for iOS or iPadOS devices.
Enable cloud proxy on Wi-Fi
Allows you to use cloud proxy when devices are connect to Wi-Fi. Cloud proxy is disabled by default and only supported for iOS or iPadOS devices.

Keep the following in mind:

  • If you select Network access, WireGuard VPN is automatically used.
  • If you select both Network access and Content controls, this does not support per-site data usage MB reporting, the ability to cap data, or separate the policy for WiFi versus cellular usage. Jamf recommends that you deploy these capabilities using Cloud proxy vectoring if you require them.

  • If you select network access alone or alongside network security or content controls, you can use managed device attestation with network relay.

  • If you select Enable network compatibility mode, on-device content filtering will be active, but DNS-based threat prevention features (e.g., enforcement for Google Safe Search and YouTube Restricted Mode) will be disabled. Ensure your existing DNS security solutions provide adequate threat protection before using this option.

For more information about traffic vectoring concepts, see Traffic Vectoring Options with Jamf Security Cloud.

Authentication

Authentication settings determine how users authenticate with the Jamf Trust app and how they display in the Jamf Security Cloud portal.

User credentials (SSO)

Users are prompted to sign in with your organization's cloud IdP. This option requires a linked identity provider in Jamf Security Cloud. If you are deploying Jamf Connect's Zero Trust Network Access or MAM-WE, IdP authentication is required.

Managed device attestation
Users enroll without authenticating with your organization's cloud IdP. Jamf recommends this option for the ease of deploying and activating Jamf Trust to your devices.

You can also choose between two different ways to create the device name for devices enrolled with the Jamf Security Cloud:

  • Assign random identifier—

    This method does not require user identification details. User profiles are generated using artificial and anonymous device details. These users can identify themselves using the About section in Jamf Trust.

  • Ask user to submit name and email—

    Users are prompted to submit a name, email, or both.

Note:

If devices are managed with UEM or MDM solution that is synced via UEM Connect, these values are overwritten with inventory information from the UEM or MDM solution during the next UEM Connect sync.

Advanced settings

Advanced settings vary based on which service capabilities are selected in the activation profile.

Display in-app secure DNS control

Determine if users are allowed to enable and disable secure DNS on their device in the Jamf Trust app. This setting applies to:

  • Devices with iOS, iPadOS, or Android operating systems

  • Activation profiles with the Network security service capability selected and secure DNS as the traffic vectoring option.

Enable Jamf customizable block pages
Displays the data block page to users when they attempt to access blocked content via an HTTP or HTTPS connection on their device.
Important:

On Apple devices, the block page cannot display in Safari if iCloud Private Relay is enabled. To disable iCloud Private Relay using an MDM or UEM solution, see Restricting iCloud Private Relay for Supervised Apple Devices.

  • If you enable this setting, you must deploy the activation profile via a UEM or MDM solution. This ensures the root certificate, which is included in the activation profile when downloaded in .mobileconfig format, is also installed on target devices.

  • If you want to enable this setting on already enrolled devices, you can download the following configuration profile with only the certificate payload and deploy it via UEM or MDM solution: https://block.jamf.com/certificate/BlockPage.mobileconfig.

    Alternatively, you can download the certificate file: https://block.jamf.com/certificate/JamfSecurityCA.crt.

Expiration date

No expiration date allows an activation profile to be used indefinitely. Alternatively, use the date selector to choose when the activation profile expires. Jamf recommends setting an expiration date.

Determine device location

Determine how a device's country information is collected. This setting applies to:

  • Devices with iOS, iPadOS, or Android operating systems

  • Activation profiles with the Content controls service capability selected

The following methods are available for determining location:

SettingDevice SensorsLocale Deduction
Best effort❌✅
Location services✅✅
Disabled❌❌

The techniques used to determine a user's location at a country level work as follows:

  • Device Sensors—

    Uses the device's location services frameworks, which usually rely on location sensing technologies such GPS, Wi-Fi, and cellular tower triangulation.

    Note:

    Access to location services requires user approval on most operating systems.

  • Locale Deduction—

    Uses metadata about the device to make a best-effort deduction of the device's location.

Note:

If you choose to disable the location collection for an activation profile, Jamf Security Cloud will apply domestic policies and display the portal's home country as the current location for devices that are enrolled with the activation profile.

Naming and grouping

Name
The activation profile's name in Jamf Security Cloud portal.
Device group
The group in Jamf Security Cloud portal that devices are added to after they enroll. This allows you to control which Jamf Security Cloud policy settings are applied to devices at the group-level.
Note:

If your UEM Connect is configured, this setting is overwritten during a the next UEM Connect sync. For more information about syncing groups with UEM Connect, see UEM Connect

  • Traffic Vectoring Options with Jamf Security Cloud
  • Enabling Identity-Based Provisioning with Jamf Security Cloud
  • Restricting iCloud Private Relay for Supervised Apple Devices

For an enhanced experience and access to additional features, log in to the Jamf Learning Hub with your Jamf ID.

Login
Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. Learn about Jamf.
Quick Links
  • Jamf Support
  • Training & Certifications
  • Jamf Account
  • Jamf Resources
  • Jamf Integrations
  • Jamf Blog
  • Jamf Nation
  • Marketplace
  • Become a Partner
  • Find a Partner
Solutions
  • The Jamf platform
  • Zero-touch deployment
  • Mobile Device Management (MDM)
  • Application management
  • Inventory management
  • Self Service
  • Identity and access management
  • Endpoint protection
  • Threat prevention and remediation
  • Content filtering and safe internet
  • Zero Trust Network Access (ZTNA)
  • Security visibility and compliance
  • CookiesCopyrightPrivacyTerms of UseTrustModern Slavery Act StatementTwitterLinkedInYouTubeInstagramFacebook
TitleResults for “How to create a CRG?”Also Available inAlertDownload