We have successfully setup Jamf Connect menu bar icon to allow privilege elevation for just our technicians by using Roles with our OIDC provider Entra. The reason for this is that we don’t want standard users to be able to request or be full admins. There are times though when an admin needs to do something with admin rights under a users profile. With our solution the idea was that a technician could be on site or remote in and use the privilege elevation feature and sign in with their own credentials to make the standard user a temporary admin. Do what they need to do and end the session.
However, this is where we run into issues. First, Jamf Connect stores an Entra token for the session. If you select the privilege elevation option again it will skip the pop up Entra sign in screen and move straight to the reason for elevation and make you admin. This token we know last for quite a while. We can see the three tokens in keychain and remove them and the Entra sign in screen will properly show and require log in again.
The second cause of concern is the keychain session token will also allow the user to go to office.com and the technician be shown as signed in. (in the case of the user never having signed in to office).
We obviously can’t have this happen this way. Has anybody done something similar and managed to find a way to keep Jamf or Microsoft from storing the token?
Just as a side note we did try a conditional access policy for the Jamf application in Entra but since it’s external we can’t enforce the sign in frequency.
Question
JAMF Connect Privilege Escalation for Tech Group only
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
