JAMF LAPS Setup Tool
I created a tool that retrieves the LAPS password from a Mac in JAMF using the free macOSLAPS utility.
First, this tool assumes the following are already in place:
JAMF Pro with macOS LAPS configured and an Extension Attribute storing the LAPS password
The Extension Attribute ID from JAMF
JAMF Pro account with rights to access LAPS passwords via API
Mac enrolled in JAMF with a stored LAPS password
Swift Dialog is utilized by the tool and is included in app version 2.1.0-4148
When the “Save Credentials” checkbox is selected, the credentials are stored in the macOS Keychain and at $HOME/Library/Application Support/jamfbootstrapper.
macOS-OneDrive-File-Keep
Move Your Desktop and Documents to OneDrive
This script is designed to run as a JAMF Pro policy. It will transfer your Desktop and Documents to OneDrive.
For a JAMF API Service account, these are the only permissions you need.
DEPNotify + Kandji - Automation for Kandji
JAMF Enrollment URL Builder
I manage multiple JAMF environments and often need to create enrollment URLs for automation or for end users to enroll their devices. I use the Enrollment Invitations feature in JAMF Pro.
Steps to create an Enrollment Invitation:
Log into JAMF Pro.
Go to Global Settings (gear icon in the top right).
Click SMTP Server and either configure a real SMTP server or enter placeholder values to enable the Enrollment Invitations section.
Navigate to Computers → Enrollment Invitations and click Enrollment Invitations.
Click New and type in an email (real or fake, like app@none.com).
Click Next, leave the next section as-is, and click Next again.
Choose an expiration date and check Allow multiple uses, then click Next.
If you used a fake email, a failure message may appear — this is normal. Click Done.
Go back to Enrollment Invitations and select the one you just created.
Retrieve the Invitation ID and JAMF Pro URL (e.g., https://myorg.jamfcloud.com).
Open JAMF Enrollment URL Generator.app and input the copied values.
When the app finishes, the enrollment URL is copied to your clipboard.
Done.
OIE-Device-Trust
Setting Up Okta OIE-Device-Trust Without Re-Enrolling in JAMF Pro
When configuring the new Okta Identity Engine (OIE) Device Trust, JAMF support indicated that the user must be MDM-enabled. For end-users created through JAMF Connect, the default approach requires un-enrolling and re-enrolling the device.
This workflow provides a method to enable OIE Device Trust without the need to re-enroll the device in JAMF Pro.
Step 1
Step 2
Step 3
A simple tool to generate a P12 file for Google LDAP and Google integration with JAMF Connect
This lightweight app will prompt you to select the .key and .crt files downloaded from Google Admin, following the JAMF Connect guide above. It will then generate a .p12 file on your Desktop, ready to upload into JAMF Pro.
Screenshots
First PPPC prompt for Downloads
Prompt to select the .key file”
Prompt to select the .crt file
Prompt to enter a password for the .p12 file
Second PPPC prompt to select the Desktop location
Generated .p12 file