Jamf - Intune integration on Macbooks with Intel Chips and Ventura

TraianNiculai
New Contributor III

Hello,

 

Has anyone been able to run Microsoft Intune Integration on Macbooks with Intel chips and Ventura OS?

TraianNiculai_0-1670948442011.png

We tried to run the policy on Macbooks with Intel chips and Ventura OS but the integration doesn't work and the device will never get registered in AAD.
We also tried with M1 chips, but there is no issue, on macbook with Monterey OS and Intel chip, the integration will work.

 

The integration will stop at this step on intel devices with Ventura:

TraianNiculai_1-1670948665767.png

 

We already tried with different browsers, deleting the profiles, using webview and reenrolling the device and everything else that could be found on the internet.

 

Has anyone been able to make this integration between Jamf and Intune with this scenario?

 

Thanks,

Traian

 

 

 

1 ACCEPTED SOLUTION

It seems that the problem is related to an SSO configuration profile. Disabling it and retrying the enrollment on a fresh machine worked. I can't find the correlation between these 2.

If you have a SSO configuration profile in place, try to remove it from the target device and retry. Also delete the record of the device from AAD first.

View solution in original post

17 REPLIES 17

andrew_nicholas
Valued Contributor

Just tested this on an Intel device and seeing the same.

daniel_behan
Contributor III

You may want to double check with JAMF Support, but for me, Conditional Access is working for macOS and it looks like Device Compliance is for iOS.  That would explain why Apple Silicon Macs would enroll over Intel.

We have raised a support ticket to Jamf and Microsoft as well, so far we don't have a fix. The only workaround we have is to downgrade the OS system to Monterey, but it's painful and time consuming.

Just following up as I haven't had any response from support. Have you?

We didn't receive any updates, but we spoke with Apple and they confirmed that this is something wrong from Jamf side. We have an escalated ticket to Microsoft Azure team as well.

It seems that the problem is related to an SSO configuration profile. Disabling it and retrying the enrollment on a fresh machine worked. I can't find the correlation between these 2.

If you have a SSO configuration profile in place, try to remove it from the target device and retry. Also delete the record of the device from AAD first.

Yeap, worked on this yesterday and I came to the same conclusion. I've provided all the info to our support ticket. 

benj
New Contributor II

Thanks for that! I just spent two days looking for a solution for this and finally found this thread. I feel like this should be addressed in the documentation. We use conditional access to block unregistered computers and this was a massive roadblock in rolling out Jamf. That was crazy frustrating.

dvasquez
Valued Contributor

How is your connector setup? Did you use the cloud connector to connect macOS and Intune Integration under Conditional Access? And did you set up the partner connector in End Point Manager or was it done for you? Just asking as we are not seeing issues registering Ventura laptops. 

 

 

Yes, we are using cloud connector, after completing the user enrollment, we are running the integration script from Self Service and the device should receive an Azure AD and check for compliance status.
We also tried with to turn off the conditional access policy for the specific user, but didn't work.

I also built the SS policy. I leave Company Portal logged into and then click on the SS policy. I am presented with the CP app, click log in, then I see the prompt you see with Continue but then I get a certificate prompt. Once trusted our clients are good to go. We do not have any additional CAP policies set on Intune registration.  We do use a basic compliance policy that needs to be met. 

Does this applies to Macbooks with intel chips and Ventura OS?

dvasquez
Valued Contributor

Sorry did not reply to you directly. I am a little under the weather. this one might sound silly but you're also not trying to register already registered devices? 

 

dvasquez
Valued Contributor

dvasquez
Valued Contributor

Can you verify the app in Intune for the connector has the correct permissions:

The Jamf Pro enterprise application in Azure has the wrong permission or more than one permission. When you create the app in Azure, you must remove all default API permissions and then assign Intune a single permission of update_device_attributes.

This would cause the registration to fail.

I am guessing your MS licensing is at least a P1 and your Jamf clients have valid licenses?

To weigh in, I’m seeing the issue as well and it works as expected for Intel devices with Monterey, and for Apple Silicon Devices with Ventura but NOT for Intel devices on Ventura.

piotrr
Contributor III

For us, for ages, we've always failed on the first attempt - worst case the JamfAAD app hangs on the first try and has to be forced-quit. On the second attempt it works. I reached out to Jamf Support who wanted full system logs, which I did not give them. 

Since then, I've also implemented the web app support in JamfAAD, but looking at the suggestions above it's possible your problem is competely different. 

 

It just seems like you're not getting the last login window from a browser or WebView, which is what I had.