Azure AD SSO

jonohayes
New Contributor III

Hi,

We have recently deployed Azure AD SSO (and Azure AD DS) to login to our Jamf Cloud instance.

It works great apart from SSO, every 24 hours we have to reset our web browser data to login to Jamf Admin.

Any ideas on how to make this more reliable? I's guessing its something to do with 'Token Expiration (Minutes)'. Should I just increase this to a few weeks?

052ebeeafc56487992bc4859fef19b1c

1 ACCEPTED SOLUTION

ThijsX
Valued Contributor
Valued Contributor

@jonohayes In the SSO settings in Jamf Pro disable the SAML token expiration
Check the docs; https://docs.jamf.com/10.20.0/jamf-pro/administrator-guide/Single_Sign-On.html

I think this will solve your problems.

Edit; depends on your Jamf Pro version if this is available, else set the token expiration time to the maximum value of 86400

View solution in original post

4 REPLIES 4

ThijsX
Valued Contributor
Valued Contributor

@jonohayes In the SSO settings in Jamf Pro disable the SAML token expiration
Check the docs; https://docs.jamf.com/10.20.0/jamf-pro/administrator-guide/Single_Sign-On.html

I think this will solve your problems.

Edit; depends on your Jamf Pro version if this is available, else set the token expiration time to the maximum value of 86400

jonohayes
New Contributor III

🤦‍♂️thanks @txhaflaire

bradtchapman
Valued Contributor II

So 'disabling' the token is only possible with Azure.  For other integrations, the only option appears to be to set a really high timeout value.  Can anyone else confirm this works for them?

navekeinan
New Contributor

Hey , 

I have set the token expiration to Disabled and can confirm this method works.