The last time I had to follow the article for integrating GSX into Jamf Pro, I found the instructions quite lacking. I'm referring to this article: https://docs.jamf.com/technical-articles/Integrating_with_Apples_Global_Service_Exchange_GSX.html
I worked on my own documentation and figured I'd share it with the community. I won't necessarily keep this up to date, but hopefully it helps people that might be looking to do the GSX integration with Jamf Pro. Hopefully Jamf will integrate these details into their technical document I linked above.
This article explains how to create a GSX account and obtain an Apple certificate. You can integrate Jamf Pro 10.15.0 or later with Apple's Global Service Exchange (GSX).
Note: As of October 1, 2019, Jamf Pro 10.15.0 or later is required to integrate with GSX. If you are using an earlier version of Jamf Pro with a GSX integration, you must upgrade to Jamf Pro 10.15.0 or later to continue integrating with GSX.
Before you can integrate Jamf Pro with GSX, you must have the following:
Creating a GSX Account
Note: This rest of this process is managed by Apple and is subject to change. Contact Apple if you need assistance creating your GSX account.
Obtaining an Apple Certificate
Obtaining an Apple certificate involves the following high level steps:
Note: Steps 1-2 are managed by Apple and are subject to change. Contact Apple for details about the process. If you have questions, contact Jamf Support.
There are two articles on the GSX website that will provide you with details and guidance for the first two steps. Log into https://gsx.apple.com and in the “Search GSX” field, search for:
Generating a CSR
To generate a CSR, follow the instructions located in the Certificates section of this GSX API FAQ site: https://gsxapi.apple.com/apidocs/prod/html/WSFaq.html
The command line openssl application can be used to generate the public/private key pair and certificate signed request (CSR). For alternatives on Windows or Java Keytool, read the FAQ site linked earlier.
Key Pair Generation
In Terminal, run the command: openssl genrsa -aes256 -out privatekey.pem 2048
When running this command, you will be prompted to enter the passphrase for the private key. This is your secure passphrase and should not be shared with anyone. This passphrase can be anything like a password.
In Terminal, run the command: openssl req -new -sha256 -key privatekey.pem -out certreq.csr
Once you enter the command, you will be asked to fill out certain information. Fill out the prompts with the details requested, but keep the following in mind when filling out those details:
One of the fields prompted for would be "Common Name (e.g. server FQDN or YOUR name)". The FQDN is a very important field and it is case sensitive. Please be sure to provide the following value for this field:
For example, if your soldTo is 0000012345, the value should be Applecare-APP157-0000012345.Test.apple.com for test and Applecare-APP157-0000012345.Prod.apple.com for production.
The leading zeroes are important and the soldTo should always be 10 digits.
Please note the following points while CSR generation.
When prompted to enter the passphrase for the private key, enter the passphrase you used earlier.
A file named certreq.csr will be created in the folder where you ran these commands from. This file will be emailed to Apple to receive a client certificate in return.
Important: The CSR generated in this process is the only valid CSR accepted by Apple for GSX connections.
Sending the CSR and GSX Account Information to Apple
The email template for new GSX API requests:
Sold-To - Your Company Name - SSL On-boarding request for [GSX Web Services / Appointment Scheduler - specify all that apply]
GSX Sold-to account number:
Primary IT contact’s name:
Primary IT contact’s email:
Primary IT contact’s phone number:
Primary business contact name(s) for API related communications:
Primary business contact email address(es) for API related communications:
Static outgoing server IP address(es) sending requests to GSX Web Services production environment:
Static outgoing server IP address(es) sending requests to GSX Web Services test environment:
Static outgoing server IP address(es) sending requests to Appointment Scheduler Production:
Static outgoing server IP address(es) sending requests to Appointment Scheduler test environment:
System design overview: [Applicable to and required for in-house/custom development]
List of API to be integrated: [Applicable to and required for in-house/custom development]
Third-party Integration Solution: Company and product name [if applicable]
Your request may be delayed if you fail to include the appropriate information. You can expect this process to potentially take 1 week to complete. This information is subject to change as Apple updates their requirements for GSX API access.
Converting the Apple Certificate (.pem) to .p12 Format
Create a .p12 file using the private key and Apple certificates by executing the following command:
openssl pkcs12 -export -inkey privatekey.pem -in cert.pem -out GSX_Cert.p12
Note: The GSX_Cert.p12 file contains your signed GSX certificate. If you do not specify a path before the file name when running the above command, the file will be in your working directory.
The certificate is saved as a .p12 file in the location you specified.
Note: The private key password is the password that you set when creating the CSR. You must also set an export password, which will be used as the keystore password when uploading to Jamf Pro.
Configuring the GSX Connection in Jamf Pro
Configure the GSX connection in Jamf Pro by providing your Apple API Token and uploading your GSX certificate. For instructions, see "Configuring the GSX Connection Settings" on the GSX Connection page in the Jamf Pro Administrator's Guide.
SSL Certificate renewal and/or IP Address updates for GSX API access
There are two other considerations to keep in mind. The SSL certificate used for GSX API access is only valid for a set amount of time which means you will need to renew it at some point. Additionally, as an on-premise customer, if you make changes to the IP address of your Jamf Pro server, you will need to provide the latest information to Apple. The steps below will lead you to the GSX articles that should explain how to handle both those scenarios.
For instructions on how to integrate Jamf Pro with GSX, see GSX Connection in the Jamf Pro Administrator's Guide.
@bpavlov Thanks for this, I have to say I agree. The info originally just says to login to GSX or go to my access to find the details. I just renewed our API tie in due to the Jamf 10.29 update that required it and I emailed GSX support and they had to direct me to downloading the new API piece since the article didn't have any details. So Bravo!
One thing you may want to include is the steps to downloading the Activation Token UI:
"Please retrieve a new Activation Token from the Token UI:" https://login-partner-connect.apple.com
When generating the CSR, one of the examples is 'Applecare-APP157-0000012345.Prod.apple.com'. Can I assume that is just the example domain name info? So if I work for Acme and my Jamf server is jamfpro.acme.com would what I enter be Applecare-APP157-my10digit#.Prod.jamfpro.acme.com orjust acme.com or literally apple.com?
If I look at the IP address for our JamfCloud instance and also see the connected IP on our Jamf Infra M Proxy via netstat it matches but it's not an IP listed on the outbound addresses from the article (it's close though)
Or does it matter since I'm assuming Apple is likely already whitelisting the JamfCloud IP addresses from other customers who also have JamfCloud?
Pick your region. I provided only the US IP addresses from that page. I am sure you are right that if you mention Jamf cloud in your application, they will already have you covered. If you are self hosted, that's another matter. Take note of my other comment about the new Common Name format also. Might save you some back and forth.
I just used these instructions and got this response back from Apple:
Checking that CSR it appears that it follows our legacy formatting for the Common Name. We notice this issue with CSRs generated within the JAMF software.
- Common Name (fully qualified host name) in format: AppleCare-Partner-[SoldToID].Prod.apple.com
Can someone here share the benefits they feel in integrating their Jamf environment with GSX besides warranty information? My environment gave up on re-integrating with GSX after upgrading to 10.15 for reasons I can't disclose and we've been using https://checkcoverage.apple.com/ to get what's needed on a case-by-case basis.
I tried running the command openssl pkcs12 -export -inkey privatekey.pem -in cert.pem -out GSX_Cert.p12 but i keep getting an error:
Error opening input file cert.pem cert.pem: No such file or directory
Any ideas about what I'm doing wrong? I currently have the PEM files in my download folder since I just got them from Apple
This maybe to late but helpful for anyone else stuck.
You will have to input where your files are in these sections:
openssl pkcs12 -export -inkey [/Users/user/privatekey.pem-in cert.pem] -in [Users/user/AppleCare-Partner-
1111111111.Prod.apple.com.cert.pem] -out GSX_Cert.p12
That will then generate the GSX_Cert.p12 for you in the same directory
Also, in case it changes, the procedure for getting the certificate can be found on GSX, by searching for OP1474.
To renew your certificate, you must send an email to email@example.com and do pretty much the same as above, send an email to except the subject line should be:
[Subject]: Your Sold-To - Your Company Name - SSL Certificate Renewal Request
The body is also pretty much the same as above:
[Message Body]: GSX Sold-to account number: GSX Ship-to account number: Primary IT contact's name: Primary IT contact's email: Primary IT contact's phone number: Primary business contact name(s) for API-related communications: Primary business contact email address(es) for API-related communications: Current certificate expiry date:
Then be sure to attached the CSR.