Linking Identity Providers (IdPs)
- Last UpdatedApr 24, 2024
- 2 minute read
After adding one or more IdPs to your Jamf Security Cloud account, you can bind them to Activation Profiles as the mechanism to authenticate end users during activation.
Native
Federated
- Native IdPs
Native IdPs are those that Jamf can integrate with directly, as illustrated in the following example:

Native vendors include:
When a native IdP is configured, users can sign in via SSO through the IdPs user interface. Native integrations also enable advanced IdP capabilities, such as password-less login.
- Federated IdPs
For other IdP vendors, Jamf can use IdP Federation via Microsoft Entra ID to enable seamless end user SSO, as illustrated in the following diagram:

The following IdPs are a selection of those compatible with Jamf via Entra ID federation:
Microsoft Active Directory Federation Services (AD FS)
Ping Identity
OneLogin
Auth0
Broadcom Identity Security
After you have successfully federated your IdP with Entra ID, you must authorize Jamf in your Entra ID tenant, or provide an authorized Entra ID identity admin with an Entra ID admin consent link to complete this step on your behalf.