AD-CS connector

Asifahmed
New Contributor III

If I have Jamf cloud and I have integrated my Jamf cloud with Azure AD for device compliance and also registering the mac in AAD then should still need AD-CS connector to get the certificate? If yes then why? and this AD-CS connector should run on DMZ?

How can I know if AD-CS connector is integrated properly in my Jamf? Is it from Settings/PKI Certificate/Certificate authority?

14 REPLIES 14

sdagley
Esteemed Contributor II

@Asifahmed The Device Compliance integration between Jamf Pro and Intune does nothing to enable proxying certificate installs via Jamf Pro like the AD CS Connector allows.

My org uses the Jamf PKI Proxy instead of the AD CS Connector so I can't speak of the latter from first hand experience, but you should be able to check the status of your AD CS Connector instance by going to Settings->Global->PKI certificates->Certificate Authorities and clicking the View button for it.

Asifahmed
New Contributor III

I am using JSS Built-in CA for enrollment, and we are using local user account on end point.  Still we need AD-CS connector? 

sdagley
Esteemed Contributor II

That depends on if you need to install certificates from your organization's CA. Some examples for needing that would be certificates needed for 802.1x Wi-Fi or VPN authentication.

Asifahmed
New Contributor III

Make sense, and does AD-CS runs on DMZ? I mean as I am on Jamf cloud so how it will speak to my cloud Jamf?

sdagley
Esteemed Contributor II

AD CS Connector is designed to communicate with an on-prem AD system, so yes it would need to live in your DMZ for that to work.

Asifahmed
New Contributor III

If any organization uses JIM server in that case AD-CS will work properly? 

sdagley
Esteemed Contributor II

A JIM instance and an AD CS Connector instance can be run on the same server, but they are separate services and one does not require the other to function. 

Asifahmed
New Contributor III

So only for one certificate(AD certificate) we are integrating AD-CS connector with Jamf or do we have different purpose? If it is only one cert then why we cant push it through a config profile and renew it before expiration?

 

BTW I cant see AD-CS here Settings->Global->PKI certificates->Certificate Authorities and clicking the View button for it. Only showing other apart from Jamf Pro Built-in CA

the AD-CS connector has to be in an accessible network segment, DMZ or likewise.  The Connector speaks to your ADCS server on your internal network and acts as a proxy directly handing certificates to Jamf Pro, in the cloud.  Jamf Pro then relays that cert to the device(in the typical setup).  When you setup the ADCS Connector it will ask for certain information.
https://learn.jamf.com/bundle/technical-paper-integrating-ad-cs-current/page/Integrating_with_Active...

Ok, so my next question is if I go to Settings/PKI Certificate/Certificate authorities then why we see so many certificates under Jamf Pro Built-in CA and with good number for Other also, from where all these certs are coming?

Asifahmed
New Contributor III

Settings->Global->PKI certificates->Certificate Authorities here I can see Jamf Pro Built-in CA and Other, no name of AD-CS. If I go to Computers/configuration Profiles/Certificate and click "Select Certificate option" no such name of AD-CS. Any idea on this?

sdagley
Esteemed Contributor II

That would indicate you do not have an AD CS Connector properly configured to communicate with your Jamf Pro instance.

AJPinto
Honored Contributor II

JAMFs logging for the AC CS Connector is minimal at best. I recommend going to the Windows Server and looking over the API logs to get an idea of what is going on. The default log path is in C:\inetpub\Logs\LogFiles\, but you can check IIS to see where the files are.

 

The AD CS Connector sets up with a local account by default, and you have to change the configuration to use a domain account. If the local account does not have access to request certificates from the template on your AD CS it will fail. 

Asifahmed
New Contributor III

Ok, so my next question is if I go to Settings/PKI Certificate/Certificate authorities then why we see so many certificates under Jamf Pro Built-in CA and with good number for Other also, from where all these certs are coming?