Skip to main content
Question

Jamf Connect Password not syncing with Azure AD correctly?

  • August 21, 2025
  • 6 replies
  • 430 views

bears97
Forum|alt.badge.img+1

This has come to my attention recently. So basically, our users would change their password via jamf connect, it would go through and successfully change their azure ad password. Then once they login to the computer, it would give them a prompt, telling them to enter their old password for the local account to sync with the new azure ad account, we also have filevault enabled. 

This was all working fine, but recently when an end user changes their password via jamf connect. It gives an error message (I didn’t see it yet, have to wait until someone changes their PW again) and it will act like it doesn’t go through, but it actually does go through. It will not update their jamf connect expiration date (For example now, some users say their passwords will expire in -10 days) even though they changed their azure ad password. 

Now we have had users getting locked out of filevault because when they sign out or restart their computer and are on the filevault page, the local account password doesn’t match the new azure ad password which is causing issues. It used to prompt them to change the local account password to match the updated azure ad credentials, but now it doesn’t do that. 

This is the JAMF Connect version 

version=11.19.1-t1754574720728

EDIT: JAMF CONNECT VERSION IS 2.45.1

TLDR: 

JAMF doesn’t recognize when a password has been changed in azure AD now, will show password will expire in -10, -20 days now, and when they sign in with their azure SSO with the new credentials, it will keep looping cause the filevault password is not the same as the current one. It also doesn’t prompt the user to update their local account password to match the azure one now (I think because JAMF connect is not recognizing when the password changes, this is the root of the issue, so it doesn’t ask the user to sync their local account/file vault password with their azure ad one).

 

6 replies

Chubs
Forum|alt.badge.img+23
  • Jamf Heroes
  • August 21, 2025

Looks like you’re showing us the JSS version (Jamf Pro Server).  Let us know what the JC version is.


bears97
Forum|alt.badge.img+1
  • Author
  • New Contributor
  • August 21, 2025

Looks like you’re showing us the JSS version (Jamf Pro Server).  Let us know what the JC version is.

Version is 2.45.1


Chubs
Forum|alt.badge.img+23
  • Jamf Heroes
  • August 21, 2025

Looks like you’re showing us the JSS version (Jamf Pro Server).  Let us know what the JC version is.

Version is 2.45.1

We had a similar issue - it’s what happened when our JC license lapsed (even for a few minutes).  May want to check on your license status.


KennethJ
Forum|alt.badge.img+6
  • New Contributor
  • February 9, 2026

Did you find a solution to this? We are running Self Service+ and have some users seeing this behaviour of the expiration going into negative numbers after the users changed their password.


Chubs
Forum|alt.badge.img+23
  • Jamf Heroes
  • February 9, 2026

Did you find a solution to this? We are running Self Service+ and have some users seeing this behaviour of the expiration going into negative numbers after the users changed their password.

If you’re using SSP and have kerberos configured, we ran into a perfect PI storm where this happened. 
 

So there’s a configuration to where you can not show the amount of days left for your password to expire and that will cause issues if you have it configured to not show. Also, if your domain is a .local - JC can see it as a subdomain and ignore it. 
 

We got around this by scripting the pw expiry date manually to a positive number and allowing kerb sync to resolve it. 


gmihailo
Forum|alt.badge.img+4
  • Contributor
  • February 9, 2026

Similar issues are starting to appear in our environment. We are using the latest jamf connect with self service plus (currently our kerberos configuration profile is a 2.4.51 profile however even updating version to a new config profile has caused issues).

 

Now if a user changes their password on a windows device even though the mac does sync with the entra password the kerberos password expiry is now past the user expiry even though their password is current). 

Also kerberos tickets no longer self renew. Self Service Plus shows a ticket error when you renew. The only thing we can do is ask the user to kinit every 8 hours. not great. I have a ticket logged but no movement yet.