Today we released Jamf Connect 2.12.0 for general availability; this release includes the below details.
Key Feature Content
Login window enhancements which include: ​​​
- [PI109797] When the ​Use Local Authentication by Default​ (​OIDCDefaultLocal​) login window preference is set to true, the ​Shutdown​ and ​Restart​ buttons now display at the button of the screen when Jamf Connect first loads. ​​​
- [JC-3808] When the ​Use Passthrough Authentication​ (​OIDCUsePassthroughAuth​) login window preference is set to true, the login window no longer displays a step indicator if there is only one step required.
Key Technical Content
- [PI109860] If your IdP is Azure or a hybrid integration and you configure the ​Discovery URL​ (OIDCDiscoveryURL​) login window preference or the ​Discovery URL​ (​Discovery URL​) menu bar app preference, ROPG now works, and you no longer get an error message. ​
- ​​[PI109787] Password synchronization no longer fails when a user connects their mobile active directory (network) account with their IdP account using Jamf Connect's local account migration workflow. ​​
- ​​[JC-3749] It is now easier for potential Jamf Connect customers to uninstall the Jamf Connect test file.​​
- ​[JC-3735] Only one Jamf Connect menu bar app now launches, rather than two, when Jamf Unlock is enabled. This results in only one Jamf Connect icon in the menu bar rather than two.​
- ​​[PI109938] When Jamf Connect is deployed automatically via Jamf Pro, user's credentials are saved in their login keychain, so they no longer receive a keychain error. Jamf Connect no longer looks for an existing keychain item in the context of the ​_appstore​ user's home directory rather than the user who is logged in and running the app.
- [JC-3910] If a user has the menu bar app open and loads the launch agent, all instances of the menu bar app are now killed so that when the system relaunches the app, only one copy is running. The second instance no longer kills itself and relaunches. ​
- [PI009255] When Jamf Connect is configured to use Kerberos authentication, users may now change their passwords on computers without a Kerberos preferences plist or with an old Kerberos preferences plist (e.g., from being previously bound to an Active Directory domain). While resolved in version 2.7.0, this issue persisted in versions 2.8.0 and 2.9.0.
- [PI102789] When a user disconnects from their VPN/internal network and attempts to change their password using Jamf Connect menu bar app's ​change password​ feature, they're no longer presented with a Kerberos password change window that fails to change their password since the Kerberos realm is unreachable. Instead, they're presented with a web interface window where they can change their IdP password.
Product Documentation
For more information, including Release Notes, please see the Jamf Connect Administrator Guide.
Thank you!
The Jamf Connect team
