Posted on 03-13-2020 01:33 PM
Does anyone use Enterprise Connect or the Apple SSO Extension in an environment with multiple realms? and how do you deploy this out or configure it?
For example, we have our user ids in different dc's or realms (excuse my lack of AD knowledge), so if my user id is XX1234 and I belong to US3 realm, (we currently use NoMAD) so my realm would be us3.dc.corp.com that will let me use my user id of XX1234.
if I tried just corp.com it won't work as the nomad or SSO tool will think the account is XX1234@corp.com, I tried a few variations of it too: dc.corp.com (thinks the username is xx1234@dc.corp.com) and so on.
I opened a case with enterprise support, but so far their engineers dont think its possible to identify multiple realms. inside the config profile you can technically create additional REALM entries but it seems to pick a random one and does not really function how I'd hope it would.
the other solution is just making multiple config profiles available via self service to our users to install as I dont see a way in Jamf to scope to a Domain or DC natively.
Posted on 03-14-2020 11:29 PM
have you defined multiple hosts preceded with a period. For example in your case it should .corp.com or .dc.corp.com.
Posted on 06-18-2020 04:53 AM
Did you resolve? We are similar we have users in the top-level domain and sub-domains, e.g
COMPANY.NET
ASIAPAC.COMPANY.NET
EMEA.COMPANY.NET
and so on
The SSO realm is set in Jamf profile to COMPANY.NET and we have added in multiple hosts of .ASIAPAC.COMPANY.NET etc but if a user in a subdomain of logs in the SSO dropdown shows
userersname@asiapac.company.net@company.net
So a strange double @
Posted on 06-19-2020 04:05 AM
I managed to resolve this by having an EA that collects the user's domain or subdomain. Then smart groups for each domain via the EA data collect and individual Profiles for each domain scoped to the relevant smart group.
So 4 smart groups, 4 profiles.
Posted on 06-22-2020 09:41 AM
We've using Enterprise Connect and the Kerberos SSO extension for Catalina users in a multi domain environment. A profile for each domain so it's locked in and smart groups that pickup on the users country or domain from the UPN value then repeat for Catalina users as it's a separate profile.
Posted on 06-23-2020 12:13 PM
@MatG @Noonan Yes, this was resolved by using out LDAP extension attributes to pull in an identifier for their realms. wildcarding .corp.domain does not work in our environment as looksups dont appear to traverse that way for this. Same issue with NoMAD.
I have individual Config Profiles for each domain, that scope to a smart group that uses the LDAP extension as its source and this so far has worked solid.