Posted on 03-14-2022 01:52 PM
Hi all,
as 12.3 is out just couple hours I went and gave it a try on my lab machines. At first I was surprised taht JAMF Connect (2.10.0) was not shown at user login screen and instead I was presented with native system login.
I have discovered that 12.3 is reseting login database and therefore to revert to JAMF Connect login screen there is a need to re-apply authchnager command. In my case I created smart group for all machines installed 12. and scoped policy which only has file and process payload defined with following command "/usr/local/bin/authchanger -reset -jamfconnect" to the smart group earlier created.
Big thanks and creds to TTG and his guide: https://travellingtechguy.blog/re-enable-jamf-connect-login-window-after-major-macos-upgrade-montere...
03-14-2022 06:12 PM - edited 03-14-2022 06:12 PM
Ran into this after the update
Posted on 03-16-2022 07:03 AM
Thanks for this post! I just had this issue with the most recent 12.3 update. Getting a policy set up with this command resolved the issue.
Posted on 03-18-2022 02:21 PM
How did you do that? I have updated the configuration, and pushed out, but nothing has changed.
03-18-2022 02:51 PM - edited 03-18-2022 02:51 PM
Posted on 03-18-2022 02:52 PM
I love this community 🥰
Posted on 03-24-2022 11:20 AM
hello, i have tried the above and i got the following error:
Result of command:
LLVM Profile Error: Failed to write file "default.profraw": Read-only file system
What can i do to fix it ?
Posted on 03-24-2022 05:35 PM
Are you sure you made the policy like showing below?
Posted on 03-28-2022 06:14 PM
I'm getting the same error on some machines: "LLVM Profile Error: Failed to write file "default.profraw": Read-only file system"
It is successful on some but not others. Can't nail down why. Same OS and same hardware on both.
Posted on 03-29-2022 08:43 AM
It is a XCODE issue, and can you try to delete or reinstall it?
03-29-2022 12:54 PM - edited 03-29-2022 12:55 PM
We do not have XCode installed at all, but still experience this error.
Posted on 03-29-2022 12:54 PM
We do not have XCODE at all
Posted on 03-29-2022 08:01 AM
yes, but the error persists.
Posted on 03-31-2022 12:51 PM
Anyone else have insight on this error?
Applied the policy but getting the "LLVM Profile Error: Failed to write file "default.profraw": Read-only file system" error
Posted on 04-01-2022 02:47 PM
I experienced this error after the 12.3 update too and even after the tiny 12.3.1 update as well. If Jamf requires us to push a policy to every Mac after every update this could be problematic in my organization as there are scenarios in which some Macs could be "stranded" without any way for users to log into their Macs (specifically laptops).
Posted on 04-01-2022 02:51 PM
If you have the policy cached on the device it could run regardless of connection. What I am stumped on is how to even figure out if a machine needs this run against it and then how to scope a policy for it.
04-01-2022 03:01 PM - edited 04-01-2022 03:07 PM
That's what I mean - there are several potential gotchas here that take some babysitting. Plus the Mac has to be available to get the policy cached in the first place.
Actually, I have had to run a couple of commands to fix this on my test Macs:
Run /usr/local/bin/authchanger -reset
Reboot
Run /usr/local/bin/authchanger -reset -JamfConnect
Running /usr/local/bin/authchanger -reset -JamfConnect doesn't fix anything. I have to blow out the authdb settings to defaults (which returns the Apple OEM login window UI) and THEN run it again to set it to Jamf Connect.
We are currently MS Azure/ADFS hybrid here.
We are currently testing JC - it's not in production yet. But this is one caveat that I am putting in the "Cons" column.
Posted on 04-13-2022 11:00 AM
I have an attribute to see if the login window is the mac default or JAMF Connect. I use this to make sure these things don't happen and then have a smart group that is on my dashboard. To automate this just need to do an ongoing policy for that smart group. Once an inventory and policy are run then the next login the user will be back using the JAMF Connect login. Of course, if you have exceptions you would want them excluded from that group.
Here's the code I use:
loginwindow_check=$(security authorizationdb read system.login.console | grep 'loginwindow:login' 2>&1 > /dev/null; echo $?)
if [ $loginwindow_check == 0 ]; then
echo "<result>OS LoginWindow</result>"
else
echo "<result>JC LoginWindow</result>"
fi
Posted on 04-14-2022 12:49 PM
Hey that's pretty handy @tculkin Thanks.
Just curious: Do you find that a reboot is required to pop the auth back to Jamf Connect or is it dynamic? I have notcied many times in my testing (as stated earlier) that I sometimes have to...
Run /usr/local/bin/authchanger -reset
Reboot
Run /usr/local/bin/authchanger -reset -JamfConnect
...otherwise the Mac has no login window UI whatsoever. Running /usr/local/bin/authchanger -reset -JamfConnect one time by itself doesnt work. And I have to perform this step after EVERY macOS update, regardlesss of the size or version. Example: macOS 11 to macOS 12 (obviously), but also updating from 12.2 to 12.3, and even updating from 12.3 to 12.3.1 all required me to reset the authdb before the Mac would allow anyone to login. Definitely not "robust" in my experience thus far.
Posted on 04-15-2022 05:38 AM
That's strange. I have not had this issue. I have policy that runs automatic on the group that doesn't have the JC Login. That policy just has /usr/local/bin/authchanger -reset -JamfConnect and the maintince of updating Inventory. I find the Inventory needs to be updated for them to fall out of that group. Once they are in the group just means next time they reboot they will get the JAMF login, it doesn't mean they are logged in with JAMF.
I have another Smart group that lets me know if they logged in with through Okta or the local authentication. This way I can tell if there is an issue with JAMF Conect.
Posted on 04-16-2022 05:10 AM
How did you create the smart group for the Okta login?
Posted on 05-13-2022 06:58 AM
Thank you so much for this. I was testing updating my environment from 12.2.1 to 12.3.1. Of course I did my machine first and was not presented with Azure AD Log in this morning. I created the extension attributes as well as smart groups and the policy. Worked like a charm. Thank you again.
05-13-2022 12:04 PM - edited 05-13-2022 12:06 PM
How are you creating the smart group for the kind of login a user does? Can you post a screenshot of the logic/config for the smart group? Also, what config profile?
Posted on 05-13-2022 12:49 PM
Yes. I created the extension attribute then created 2 smart groups. "Jamf Connect Log In Window is False/True"
I am still in testing so I made a 3rd smart group that includes the test group AND falls in the Mac OS Log in false.
Posted on 09-23-2022 06:00 AM
Would you be able to show how you set up your Extension Attribute for this? Thanks!
Posted on 08-12-2022 12:35 PM
I want to avoid our Mac users encounter this event when they update their computer at any time. I was thinking of having the policy running all the time so in the event of a user updating their Mac they do not get this problem. What do you guys recommend for the "Trigger" and "Execution Frequency" for the Authchanger policy mentioned in the "Travelling Tech Guy" link below