I'm having trouble getting Jamf AD CS connector to work flawlessly, and wondering if anyone else has a similar use case, and if they managed to solve it.
Recently procured Jamf
On-Prem AD
AD CS setup in a different domain, but there is a trust relationship (and it works for other MDMs and bound clients)
Using a domain user account, instead of the local user (AdcsProxyAccessUser) created by the .\\deploy.ps1
The domain account has been configured on both the AdcsProxy site configuration, for oneToOneMappings under system.webServer/security/authentication/iisClientCertificateMappingAuthentication
It's also been modified to be the Identity for the AdcsProxyPool.
Certs issue successfully, but only if the same user account is a member of the administrators local group on the server.
Jamf Support are saying this shouldn't be the case, but cannot get to the bottom of which permission it needs that's granted by Administrators, that it needs to successfully issue certs.
Any ideas if I've missed something?
