Hi All,
Apologies for my tardiness in responding, I have been busy implementing Jamf across our organisation and training out usage!
So the setup in AD is an AD group for each site, each site is added to a "regional" group so as to save on adding admins to each group, I can just add them to the regional one. All sites are added to a service desk group so that they have access to all sites, nested and so on and so on. (we have 50 sites in our organisation).
Bring in the AD LDAP group and add that group to the site in Jamf.
I am more than happy to discuss this via Skype/phone/email if anyone still has difficulties!!! But let me know if you get it to work.
Our setup is now like so:
SSO
SSO enabled
User Mapping: SAML NameID
User Mapping: Jamf Pro: Username
Group Attribute Name: http://schemas.xxx.org/xxx/xxx
Identity Provider: Active Directory Federation Services
Identity Provider Metadata source: Metadata URL http://(Address for Azure)
EntityID: https://JamfcloudURL/saml/metadata
Certificate.pfx
LDAP Settings
Jamf Infrastructure Manager installed in DMZ
Directory Service: MS Active Directory
Server IP x.x.x.x:389
Enable LDAP Proxy - address of server in DMZ
Proxy binding address xxx.xxx.org:8389
Auth Type Simple
LDAP Server account: DN name of account to authenticate with AD
Referral response: Use default from LDAP service
User Mappings
Object Class Limitation: All ObjectClass Values
Object Class(es) OrganisationalPerson, user
Search Base DC=DC=DC=
Search Scope: All Subtrees
Attribute Mappings
UserID uSNCreated
Username sAMAccountName
Real Name displayName
Email Address userPrincipalName
User UUID objectGUID
User Group Mappings
Object Class Limitation All ObjectClass Values
Object Class(es) group, top
Search base DC=DC=DC=
Search scope All Subtrees
Attribute Mappings
Group ID uSNCreated
Group Name name
Group UUID objectGUID
Group Membership Mappings
Member Ship Location user Object
Group Membership Mapping memberOf
Use distinguished name of user groups when searching = ticked
Use recursive group searches = ticked