Skip to main content
Solved

Self Service Not Reachable After Connecting to Active Directory

  • April 26, 2022
  • 12 replies
  • 68 views

Forum|alt.badge.img+3

Hi,

 

As of Monday, any device that runs our Self Service policy to bind to Active Directory immediately loses access to Self Service with the message that the MDM Server is not available. We can manually bind to AD in System Preferences which works fine, but using the built in Directory Binding has suddenly stopped Self Service working.

 

Has anyone else experienced this?

Thanks,

Best answer by howie_isaacks

Also done this @howie_isaacks, it's every single new device we are enrolling. The whole process is fine until we run the Policy in Self Service - what's also interesting is the policy works, the device binds to AD and then Self Service goes offline.


Maybe this is a good time to re-think binding to AD. What real benefit do you get from doing it? That said, what exactly does the policy do? What happens if you bind to AD using a configuration profile instead?

12 replies

Forum|alt.badge.img+10
  • Valued Contributor
  • April 26, 2022

We are having the same issues ourselves


howie_isaacks
Forum|alt.badge.img+23
  • Esteemed Contributor
  • April 26, 2022

What do you see if you query the Jamf Pro server using Terminal?

ex. "dig jss.jamfproserver.com"

Does it return the expected information? I have never used Self Service for AD binding but I wonder if the Jamf public keys in Keychain have been damaged.

 

com.jamfsoftware.SelfService.publickey

com.jamfsoftware.SelfService.privatekey


Forum|alt.badge.img+10
  • Valued Contributor
  • April 26, 2022

What do you see if you query the Jamf Pro server using Terminal?

ex. "dig jss.jamfproserver.com"

Does it return the expected information? I have never used Self Service for AD binding but I wonder if the Jamf public keys in Keychain have been damaged.

 

com.jamfsoftware.SelfService.publickey

com.jamfsoftware.SelfService.privatekey


@howie_isaacks I don't uses SS for binding but I have the same issue with Wildly where SS is not reachable.

I have reimaged 2 workstations and still the same results

I have ran the Dig command and received the expected output

; <<>> DiG 9.10.6 <<>> jssproserver.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;jssproserver.com. IN A

;; AUTHORITY SECTION:
com. 900 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1650997885 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: xxx.xxx.xxx.xxx#xxx(xxx.xxx.xxx.xxx)
;; WHEN: Tue Apr 26 13:32:02 CDT 2022
;; MSG SIZE rcvd: 118


howie_isaacks
Forum|alt.badge.img+23
  • Esteemed Contributor
  • April 26, 2022

@howie_isaacks I don't uses SS for binding but I have the same issue with Wildly where SS is not reachable.

I have reimaged 2 workstations and still the same results

I have ran the Dig command and received the expected output

; <<>> DiG 9.10.6 <<>> jssproserver.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;jssproserver.com. IN A

;; AUTHORITY SECTION:
com. 900 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1650997885 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: xxx.xxx.xxx.xxx#xxx(xxx.xxx.xxx.xxx)
;; WHEN: Tue Apr 26 13:32:02 CDT 2022
;; MSG SIZE rcvd: 118


If the two keychain items I mentioned before are corrupted Self Service won't work at all. Deleting them and then re-enrolling should fix that.


Forum|alt.badge.img+3
  • Author
  • New Contributor
  • April 27, 2022

@howie_isaacks thanks for the suggestions. Everything looks fine in Terminal, and I've also tried deleting those 2 keys, reinstalling Self Service and still no luck. Once it is reinstalled it still has the offline error.


howie_isaacks
Forum|alt.badge.img+23
  • Esteemed Contributor
  • April 27, 2022

Why not unenroll the system from Jamf Pro and then re-enroll it? Running "/usr/local/jamf/bin/jamf removeFramework" will remove the Jamf agent, the keychain items, and everything else installed by Jamf Pro including Self Service. I'm trying to understand how binding to AD would cause this.


Forum|alt.badge.img+3
  • Author
  • New Contributor
  • April 27, 2022

Also done this @howie_isaacks, it's every single new device we are enrolling. The whole process is fine until we run the Policy in Self Service - what's also interesting is the policy works, the device binds to AD and then Self Service goes offline.


howie_isaacks
Forum|alt.badge.img+23
  • Esteemed Contributor
  • Answer
  • April 27, 2022

Also done this @howie_isaacks, it's every single new device we are enrolling. The whole process is fine until we run the Policy in Self Service - what's also interesting is the policy works, the device binds to AD and then Self Service goes offline.


Maybe this is a good time to re-think binding to AD. What real benefit do you get from doing it? That said, what exactly does the policy do? What happens if you bind to AD using a configuration profile instead?


Forum|alt.badge.img+3
  • Author
  • New Contributor
  • April 27, 2022

Maybe this is a good time to re-think binding to AD. What real benefit do you get from doing it? That said, what exactly does the policy do? What happens if you bind to AD using a configuration profile instead?


Our user accounts are managed in our on-prem AD so we bind to be able to use these - the configuration profile is an interesting idea, I will definitely try this, thanks!


howie_isaacks
Forum|alt.badge.img+23
  • Esteemed Contributor
  • April 27, 2022

Our user accounts are managed in our on-prem AD so we bind to be able to use these - the configuration profile is an interesting idea, I will definitely try this, thanks!


I had a client who insisted on binding Macs to Open Directory until I finally talked them out of it. I used a configuration profile for that. I worked really well. Directory binding would really screw up my auto enrollment and setup process. Jamf Connect works great for that.


Forum|alt.badge.img+3
  • Author
  • New Contributor
  • April 27, 2022

I had a client who insisted on binding Macs to Open Directory until I finally talked them out of it. I used a configuration profile for that. I worked really well. Directory binding would really screw up my auto enrollment and setup process. Jamf Connect works great for that.


Configuration Profile worked! Thanks for the suggestion, setup just now and Self Service remains online once run - brilliant.


howie_isaacks
Forum|alt.badge.img+23
  • Esteemed Contributor
  • April 27, 2022

Configuration Profile worked! Thanks for the suggestion, setup just now and Self Service remains online once run - brilliant.


I'm glad that worked for you! This is why I love Jamf Nation 😍