Skip to main content
Question

Jamf Connect Menu Bar Password Expiration and Azure AD


Forum|alt.badge.img+4

I haven't seen any documentation so I'm not sure if this is possible but I'd like to show days until password expiration on Jamf Connect Menu Bar. Does anyone have any info on how to do this if it is possible?

16 replies

Forum|alt.badge.img+13

@davidmundt it's not currently possible if relying exclusively on Azure AD. When AD is involved, Connect requires being able to connect back to AD on-premise to get information about password expiration. 


Forum|alt.badge.img+6
  • Contributor
  • 31 replies
  • November 12, 2021

I just found this:

Password Syncing with Jamf Connect - Jamf Connect Administrator's Guide | Jamf

Is there a reason why an Azure only setup wouldn't work? According to the Jamf documentation, it should, but I have not been able to test it yet.


Forum|alt.badge.img+4
  • Author
  • Contributor
  • 16 replies
  • November 12, 2021
Scott_Conway wrote:

I just found this:

Password Syncing with Jamf Connect - Jamf Connect Administrator's Guide | Jamf

Is there a reason why an Azure only setup wouldn't work? According to the Jamf documentation, it should, but I have not been able to test it yet.


We are currently using Azure AD only on our Macs. but the JCL menu bar app doesnt show the password expiration like Nomad did. My users are relying on Azure AD to popup in a browser to alert them to the need for a password change.


Forum|alt.badge.img+6
  • Contributor
  • 31 replies
  • November 12, 2021
davidmundt wrote:

We are currently using Azure AD only on our Macs. but the JCL menu bar app doesnt show the password expiration like Nomad did. My users are relying on Azure AD to popup in a browser to alert them to the need for a password change.


Have you already set in the configuration profile these two values?

<key>ExpirationCountdownStartDay</key>

<integer>14</integer>

<key>ExpirationNotificationStartDay</key>

<integer>7</integer>


Forum|alt.badge.img+4
  • Author
  • Contributor
  • 16 replies
  • November 15, 2021
Scott_Conway wrote:

Have you already set in the configuration profile these two values?

<key>ExpirationCountdownStartDay</key>

<integer>14</integer>

<key>ExpirationNotificationStartDay</key>

<integer>7</integer>


I have not tried those keys. I was under the impression they were for AD not Azure AD but I will give them a try. Thanks!!!


hodgesji
Forum|alt.badge.img+16
  • Contributor
  • 63 replies
  • February 7, 2022
Scott_Conway wrote:

Have you already set in the configuration profile these two values?

<key>ExpirationCountdownStartDay</key>

<integer>14</integer>

<key>ExpirationNotificationStartDay</key>

<integer>7</integer>


I do have those keys set and I still don't get the password expiration date listed in the Menu Bar app.


Forum|alt.badge.img+6
  • Contributor
  • 31 replies
  • February 7, 2022
hodgesji wrote:

I do have those keys set and I still don't get the password expiration date listed in the Menu Bar app.


In our environment we also had to set the Kerberos realm so tickets were pushed to our Mac's from the local AD. Now the countdown shows up in the menu bar.

I still have not gotten the expiration notification to work though.


Forum|alt.badge.img+4
  • Author
  • Contributor
  • 16 replies
  • February 7, 2022
Scott_Conway wrote:

In our environment we also had to set the Kerberos realm so tickets were pushed to our Mac's from the local AD. Now the countdown shows up in the menu bar.

I still have not gotten the expiration notification to work though.


We are all remote and relying on Azure AD for the IDP. I'd love to get it to show days till expiration but it still doesnt.


Forum|alt.badge.img+7
Scott_Conway wrote:

In our environment we also had to set the Kerberos realm so tickets were pushed to our Mac's from the local AD. Now the countdown shows up in the menu bar.

I still have not gotten the expiration notification to work though.


Do you have an example of this? 

I have Kerberos tickets getting pushed and I still do not see the countdown


Forum|alt.badge.img+6
  • Contributor
  • 31 replies
  • April 21, 2022
DaneAbernathy wrote:

Do you have an example of this? 

I have Kerberos tickets getting pushed and I still do not see the countdown


Here is our Jamf Connect keys regarding the countdown and notification popup:

<key>PasswordPolicies</key>

<dict>

<key>ExpirationCountdownStartDay</key>

<integer>14</integer>

<key>ExpirationNotificationStartDay</key>

<integer>7</integer>

</dict>


Forum|alt.badge.img+7
Scott_Conway wrote:

Here is our Jamf Connect keys regarding the countdown and notification popup:

<key>PasswordPolicies</key>

<dict>

<key>ExpirationCountdownStartDay</key>

<integer>14</integer>

<key>ExpirationNotificationStartDay</key>

<integer>7</integer>

</dict>


Thanks!

I took over our Jamf Management on the computer side, and a lot of things weren't configured correctly, in this case (i hadn't thought to check this) our kerberos realm was wrong.


dvasquez
Forum|alt.badge.img+16
  • Valued Contributor
  • 318 replies
  • September 6, 2022

We are seeing the expiration password counter. But some of our end-users see a -22 (for example) counter in the menu bar or after a successful password change there is the wrong number of days. Does anyone see this and have success correcting it?  

We have a K-Realm and the configuration is set correctly.  it is more annoying than anything. 

Being on a VPN sometimes fixes this and sometimes it does not. 


kinit and reentering the K-Realm password for the end user and restarting Jamf Connect do not correct the counter.


Forum|alt.badge.img+16
  • Valued Contributor
  • 401 replies
  • March 20, 2023

We're Okta with OIDC and AD... (not an identity protect specialist, hacking away as best I can without access to the big boy tools). With Enterprise Connect and Kerberos SSO our clients can see how many days remain until their password expires (immediately the same day they change their password). But JamfConnect only shows the options to warning X days before? Nothing to show how many days remain if outside the short time warnings?


Forum|alt.badge.img+7

Anyone got this working?
I'm using Jamf Connect with Azure AD only and do not get any password notifications or see anything like days to expire or so.

<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "> <plist version="1.0"> <dict> <key>Appearance</key> <dict> <key>ShowWelcomeWindow</key> <false/> </dict> <key>HiddenMenuItems</key> <array> <string>about</string> <string>preferences</string> <string>quit</string> <string>resetpassword</string> </array> <key>IdPSettings</key> <dict> <key>Provider</key> <string>EntraID</string> <key>ROPGID</key> <string></string> <key>TenantID</key> <string></string> </dict> <key>PasswordPolicies</key> <dict> <key>ExpirationCountdownStartDay</key> <integer>15</integer> <key>ExpirationNotificationStartDay</key> <integer>15</integer> <key>NetworkCheck</key> <integer>30</integer> <key>PasswordChangeWorkflow</key> <string>Web</string> </dict> <key>SignIn</key> <dict> <key>AutoAuthenticate</key> <true/> <key>AutoOpenAppAtLogin</key> <true/> <key>PasswordLabel</key> <string>Password</string> <key>RequireSignIn</key> <true/> <key>UsernameLabel</key> <string>Email</string> </dict> <key>UserHelp</key> <dict> <key>HelpOptions</key> <string>website</string> <key>HelpType</key> <string>URL</string> </dict> <key>ChangePasswordURL</key> <string></string> </dict> </plist>
 
Anyone who has this working and can share his thoughts/plist file would be highly appreciated!

Forum|alt.badge.img+5
  • New Contributor
  • 4 replies
  • January 9, 2025
Joostvantwout wrote:

Anyone got this working?
I'm using Jamf Connect with Azure AD only and do not get any password notifications or see anything like days to expire or so.

<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "> <plist version="1.0"> <dict> <key>Appearance</key> <dict> <key>ShowWelcomeWindow</key> <false/> </dict> <key>HiddenMenuItems</key> <array> <string>about</string> <string>preferences</string> <string>quit</string> <string>resetpassword</string> </array> <key>IdPSettings</key> <dict> <key>Provider</key> <string>EntraID</string> <key>ROPGID</key> <string></string> <key>TenantID</key> <string></string> </dict> <key>PasswordPolicies</key> <dict> <key>ExpirationCountdownStartDay</key> <integer>15</integer> <key>ExpirationNotificationStartDay</key> <integer>15</integer> <key>NetworkCheck</key> <integer>30</integer> <key>PasswordChangeWorkflow</key> <string>Web</string> </dict> <key>SignIn</key> <dict> <key>AutoAuthenticate</key> <true/> <key>AutoOpenAppAtLogin</key> <true/> <key>PasswordLabel</key> <string>Password</string> <key>RequireSignIn</key> <true/> <key>UsernameLabel</key> <string>Email</string> </dict> <key>UserHelp</key> <dict> <key>HelpOptions</key> <string>website</string> <key>HelpType</key> <string>URL</string> </dict> <key>ChangePasswordURL</key> <string></string> </dict> </plist>
 
Anyone who has this working and can share his thoughts/plist file would be highly appreciated!

The computer needs to be on a network that can see AD to get the password expiring. That info does not come thru Azure.


dvasquez
Forum|alt.badge.img+16
  • Valued Contributor
  • 318 replies
  • January 9, 2025
mikevandelinder wrote:

@davidmundt it's not currently possible if relying exclusively on Azure AD. When AD is involved, Connect requires being able to connect back to AD on-premise to get information about password expiration. 


That is correct.

Your AAD should have access to Kerberos and AD. It also helps to frequently kill (refresh) that ticket for the client. Our JCClient does it each time the user clicks connect or logs out, and we definitely use SSPR when the user changes their password.

 

 


Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings