Jamf Nation Idea: Remove Jamf Account SSO dependency for new features (Ex: Blueprints, Compliance)

mvu
Valued Contributor III

We're not a fan of Jamf requiring a Jamf Account SSO setup to access new features such as Blueprints or Compliance Benchmarks. What about new features down the pipeline?

I was looking forward to Blueprints, and we use the JCE now for Compliance Benchmarks (CIS Level 2). So, the new features had us excited since it was presented at JNUC 2024.

However, the Jamf Account SSO setup may be a deal breaker for organizations. 

Consider reading and voting for this Jamf Nation Idea:
https://ideas.jamf.com/ideas/JPRO-I-1182

3 REPLIES 3

jamf-42
Valued Contributor II

🍿

AJPinto
Esteemed Contributor

I also work in an org that is not too happy about this, and how short sighted it is. I get leaning on Jamf Account for smaller organizations that may not have fully fleshed out identity management, but enterprise on the other hand has absolutely no need for a function like this and it is only increasing the threat surface.

In the very least Jamf should allow the admin to configure both an IDP and Jamf Account and let them select which one Jamf will use to authenticate the console while still allowing Jamf Account to map back to Jamf Services. Not like Jamf does not already have you log in with your Jamf Account in to a few places in settings already to enable functions.

Chris_Cover
Contributor

Yes.

I was about to do this and ran into this roadblock. A competitor has access to the one item I needed without such hoops.