Posted on 07-12-2023 06:15 AM
I'm pretty sure I know the answer, but can't find the statement in any documentation. Is it possible to pull attributes when you have Cloud Identity Provider enabled for Azure in via extension attributes? If so, what attributes are available?
Solved! Go to Solution.
Posted on 07-12-2023 09:43 AM
Figured it out. I had a bad EA asking for something that wasn't permitted. Removed that EA and now I'm getting data!!
07-12-2023 07:41 AM - edited 07-12-2023 07:41 AM
Yes, you can pull extended attributes from Azure AD into an Extension Attribute. I used the Microsoft Graph Explorer to find a weird attribute (proxyAddresses), one that I knew would not be in Jamf Pro, put it into an Extension Attribute and the info was pulled back.
Posted on 07-12-2023 08:46 AM
Do you have Azure setup under LDAP servers or Cloud Identity Provider?
Posted on 01-16-2024 11:02 AM
Hi there, i have been looking into the same thing. Total newbie here.
How do you achieve calling Graph from JAMF to populate the data? Is it an API call? I am a bit lost...
When i look into my JAMF instance in the "Extension Attributes" there is nothing that mentions my iDP. Jamf training also mentions LDAP but we are not connecting any of that as we are going cloud first.
Any idea where i need to look or what i have to read to understand what i should do to pull the data from Azure ?
Thanks
Posted on 01-16-2024 11:17 AM
Apologies this is the right screenshot
Posted on 01-16-2024 11:57 AM
As long as you have a Cloud Identity Provider configured under Settings -> System -> Cloud Identity Providers, you should have the option to pull from Directory Service.
I have nothing configured under LDAP Servers. I only have entries under Cloud Identity Providers.
Posted on 01-16-2024 11:58 AM
And my mention of Microsoft Graph was simply as a way to determine what attribute to pull out of Entra ID.
Posted on 01-16-2024 12:16 PM
Thanks
interesting... I have not got the option. I have Azure Configured and test returns results without issue. Might be a JAMF quirk?
Posted on 01-16-2024 12:51 PM
Under Settings -> Computer Management -> Inventory Collection, make sure you have "Collect user and location information from Directory Service" checked.
I just spun up a fresh instance, added Cloud Identity Provider connected to my Entra ID instance, and checked that box and I get the Directory Service Attribute Mapping option in Extension Attributes.
That checkbox is also needed if you want user information to populate on device records in Jamf Pro.
Posted on 01-16-2024 12:57 PM
BOOM!
Thanks a lot for that! Cheeky little option that was!
01-19-2024 10:04 AM - edited 01-19-2024 10:04 AM
@MMTechno, did you have to do anything else? Still, after finding these instructions, we struggled to pull the fields we wanted. Some examples we want to pull data from are in the pictures below, and we will map to those spots.
Posted on 01-19-2024 10:09 AM
@daniel_ross I'm guessing those fall under `onPremiseExtensionAttributes` right? Currently Jamf Pro is unable to collect from that JSON object because it is a list of attributes (like an array).
You may find those attributes elsewhere in the user record where they have a UDID of sorts as part of the name. Something like `extension_a34572989d08a08c899b999a_country`, or whatever. If you have those entires and they are not part of a JSON "array" (for lack of a better term), then you may be able to pull those in.
Posted on 07-01-2024 01:09 PM
Did you ever solve this? I'm running into this same issue.
Posted on 06-01-2024 09:23 PM
Hey Steve... Do you know what the attribute name would be to get a list of groups that a user is a member of? When using LDAP, the attribute name was "memberOf" but that doesn't seem to work after switching to an Entra ID connection.
Posted on 06-05-2024 10:39 AM
As far as I am aware, Entra ID does not have the concept of 'memberOf.' Instead, you determine group membership by looping through every group and checking if the user is part of the group. So unfortunately there is no easy way to build an Extension Attribute to pull in group information because of that.
Posted on 07-12-2023 08:49 AM
CIP... I have no LDAP servers configured in the server I was testing with.
Posted on 07-12-2023 09:07 AM
Interesting....mine won't pull anything in.....
Posted on 07-12-2023 09:12 AM
Are you verifying the attribute you are pulling from has data via the Microsoft Graph Explorer first? And then I have to ask it, you are updating inventory on the device, right? ;-)
Posted on 07-12-2023 09:20 AM
yes and yes! I noticed using the graph explorer, if you use v1 there is very limited info. If I switch to Beta i get a lot more data (including the proxyAddresses which is not returned on v1).
Posted on 07-12-2023 09:23 AM
The only other thing I can think is that you still have an LDAP server configured. I believe that an LDAP server takes precedence over CIP. I had my Okta dev account configured under LDAP and when I tried to pull info it would pull from Okta and not Azure. So I deleted the Okta LDAP setup and CIP took over.
Worst case, you can open a support ticket and they should be able to assist.
Posted on 07-12-2023 09:43 AM
Figured it out. I had a bad EA asking for something that wasn't permitted. Removed that EA and now I'm getting data!!