Hello all,
My org is currently using PEAP rather than TLS for Macs to access our network. We've set it up so that JAMF is only accessible on our internal network.
Because network access doesn't occur until AFTER login (since PEAP uses the user credentials), the login trigger in a policy never gets applied (since it doesn't connect to the network, and thus JAMF, until after login). A solution to this is to push out a configuration profile that has "Use as a Login Window configuration" network setting applied. This actually works really well. The user logs in, authenticates against the local network, and policy triggers get applied.
The problem: after enabling FileVault 2, this bypasses the typical login window, and in turn bypasses the "Login Window configuration" setting. So the login trigger for policies again doesn't work.
Aside from using TLS or some kind of machine based authentication, does anyone have suggestions for a way to work around this? We would really like to use the login trigger since it's one of the only two (self service being the other) that can target a policy based on the user. It's not super critical, but makes it really painful as otherwise I have to script extension attributes based on AD lookups.
Providing public access for JAMF is currently off the table, and we will be implementing FileVault 2 company-wide regardless of the loss of functionality.
Thanks,
Jerry