(I know I'm responding to an old post, hopefully this will help someone at some point.)
1) Kinda. I generate the CSR manually with (this is a copy of my internal documentation):
- Run the following command in a terminal:
openssl genrsa -aes256 -out privatekey.pem 2048
- When prompted, enter the passphrase for the private key. This is your secure passphrase and should not be shared with anyone
- Run the following command in a terminal:
openssl req -new -sha256 -key privatekey.pem -out certreq.csr
- Enter the following information when prompted:
- Passphrase used in earlier step
- Country Name (2 letter code) []
- State or Province Name (full name) []
- Locality Name (eg, city) []
- Organization Name (eg, company) []
- Organizational Unit Name (eg, section) []
- Common Name (eg, fully qualified host name) []:
- In of format: <AppleCare-Partner-XXXXXXXXXX.Test.apple.com> or <AppleCare-Partner-XXXXXXXXXX.Prod.apple.com>
- where XXXXXXXXXX is your company or organization's Apple-assigned Sold To number, including leading zeros
- Email Address []:
- Any challenge password:
- Zip the CSR file and to gsxws@apple.com and CC your Apple account reps, and include the following information in the body of the email:
Sold To & Ship To (account numbers): ####### / #######
Environment you are attempting to access: GSX Documentation Access
AppleID used for authentication:
API consumed: GSX
GSX Sold-to account number: #######
GSX Ship-to account number: #######
Access recipient email address:
Requestor’s role: Jamf Pro Administrator
Primary IT contact name:
Primary IT contact email:
Primary IT contact phone number:
Primary business contact name(s) for API related communications:
Primary business contact email address(es) for API related communications:
After receiving the certs back from Apple, you can then follow the guide you linked, specifically the step "Converting the Apple Certificate (.pem) to .p12 Format."
2) Yes, you can use the same GSX Cert in multiple Jamf Pro instances, HOWEVER, each instance will need its own, unique GSX user account (and Partner API Token).
(I know I'm responding to an old post, hopefully this will help someone at some point.)
1) Kinda. I generate the CSR manually with (this is a copy of my internal documentation):
- Run the following command in a terminal:
openssl genrsa -aes256 -out privatekey.pem 2048
- When prompted, enter the passphrase for the private key. This is your secure passphrase and should not be shared with anyone
- Run the following command in a terminal:
openssl req -new -sha256 -key privatekey.pem -out certreq.csr
- Enter the following information when prompted:
- Passphrase used in earlier step
- Country Name (2 letter code) []
- State or Province Name (full name) []
- Locality Name (eg, city) []
- Organization Name (eg, company) []
- Organizational Unit Name (eg, section) []
- Common Name (eg, fully qualified host name) []:
- In of format: <AppleCare-Partner-XXXXXXXXXX.Test.apple.com> or <AppleCare-Partner-XXXXXXXXXX.Prod.apple.com>
- where XXXXXXXXXX is your company or organization's Apple-assigned Sold To number, including leading zeros
- Email Address []:
- Any challenge password:
- Zip the CSR file and to gsxws@apple.com and CC your Apple account reps, and include the following information in the body of the email:
Sold To & Ship To (account numbers): ####### / #######
Environment you are attempting to access: GSX Documentation Access
AppleID used for authentication:
API consumed: GSX
GSX Sold-to account number: #######
GSX Ship-to account number: #######
Access recipient email address:
Requestor’s role: Jamf Pro Administrator
Primary IT contact name:
Primary IT contact email:
Primary IT contact phone number:
Primary business contact name(s) for API related communications:
Primary business contact email address(es) for API related communications:
After receiving the certs back from Apple, you can then follow the guide you linked, specifically the step "Converting the Apple Certificate (.pem) to .p12 Format."
2) Yes, you can use the same GSX Cert in multiple Jamf Pro instances, HOWEVER, each instance will need its own, unique GSX user account (and Partner API Token).
Hi @MLBZ521 is the "Sold-to account number" the same as "Customer Account Number" Not seeing anything in MyAccess for
GSX Sold-to account number: #######
GSX Ship-to account number: #######
Hey @dlondon, yes the `GSX Sold-to account number` is the same as `Customer Account Number` in MyAccess.
Thanks @MLBZ521
I just shot off my request but the automated response also mentioned the need to provide
Raw JSON request and response and full request and response headers
Raw XML request and response
Is that something you have seen seen? I'm hoping it can be ignored
@dlondon I think it can be if you are connecting this to Jamf Pro or at least specify that that is what you're doing. This is the same method that would be used for AASPs when integrating GSX APIs into a proprietary POS system.
Thanks @MLBZ521 got it working finally. I was forgetting to change the pem received back from apple to p12 and the Jamf interface seemed to imply I could use a pem so kept failing. Backtracked through the documentation mentioned above and realised my mistake.
Thanks @MLBZ521 got it working finally. I was forgetting to change the pem received back from apple to p12 and the Jamf interface seemed to imply I could use a pem so kept failing. Backtracked through the documentation mentioned above and realised my mistake.
Yeah......never trust Jamf.....
Thanks @MLBZ521 got it working finally. I was forgetting to change the pem received back from apple to p12 and the Jamf interface seemed to imply I could use a pem so kept failing. Backtracked through the documentation mentioned above and realised my mistake.
Glad the information was helpful to someone though!
One thing that might not be so obvious is that whilst you can see the content of the pem cert received back from Apple in finder, when you convert it to p12 you cannot. However if you import it to keychain it will prompt for the Export Password used when you converted to p12 and then you can see the full cert in keychain.
There's probably a way on the command line to do the same thing