Posted on 07-01-2016 07:45 AM
I'm working on the 802.1x problem from this post, and I'm trying to sign the profile in Profile Manager with my JSS certificate. I don't see a way to download the signing cert & pk, so I'm wondering if there's a way to request one from https://jss.domain.com:8443/CA? The problem is, when I upload the profile I created, it's signed by my local machine's certificate which isn't trusted. I'd like the profile to show "Verified" in the Profiles system preference pane like the rest of my profiles.
Posted on 07-01-2016 08:20 AM
You can use any certificate you have the private key to, to sign your configuration profiles made in profile manager. You can use this command in terminal:
/usr/bin/security cms -S -N "Common Name of cert you want to use" -i /path/to/unsigned/profile.mobileconfig -o /path/to/newly/signed/profile.mobileconfig
Just fill in the variables with your information and that should work and show as verified.
Should also note that the certificate and its private key must be in the system keychain of the mac you're using to run this command.
Posted on 07-05-2016 07:20 AM
@perrycj I get that, but I'm trying to use a cert from the JSS PKI itself. How would I get the cert and private key?
Posted on 04-25-2018 08:03 AM
@PhillyPhoto Did you ever get this issue fixed? I am on the same situation on a Windows environment. I am using a private cert and I need to enable SSL.
Posted on 07-19-2018 02:47 AM
JSS does not itself enable signing uploaded configuration profiles. If you upload an unsigned profile either the contents can be exposed or it can be shown as unverified in Profiles on the Mac. If you use an alternative signing certificate it again may end up being shown as unverified because it is not part of the chain of trust.
The inability for uploaded profiles to be easily signed by JSS by an approved administrator is (one of many) areas where JAMF are failing to make life easier for administrators.
JSS does not allow downloading the private key for its own signing certificate although it does allow downloading its own rootCA and private key. Arguably the rootCA for JSS is even more of a security risk than its signing certificate so why this is so seems completely illogical. As such you therefore cannot use the same JSS signing certificate externally to JSS to sign your profile before uploading it.
However since as detailed above it is possible to download the JSS rootCA and private key there is a workaround that duh works. ;) This is to use the JSS internal rootCA and private key to create your own signing certificate.
Note: Apple's Keychain Access utility cannot create 'proper' signing certificates. I use the free XCA tool instead and created a template which marks the certificate as a 'proper' signing certificate.
Note: The built-in JSS signing certificate is not marked as a 'proper' signing certificate although obviously it does the job. The picture below shows the attribute a proper signing certificate would have.
Posted on 08-08-2018 07:52 AM
Posted on 08-15-2018 07:46 AM
@lockwojo , could you elaborate on Step 2 in the instructions you provided, or what you did with SCA? I was able to download the backup you mentioned in Step 1 (a .p12 file), but I'm unsure of what to do after that. I tried just importing it into Keychain (I don't think that's what I was supposed to do, but I didn't know what else to try) and it didn't show up as a signing option in Apple Configurator 2. I'm experimenting with XCA now, but was hoping you could provide some guidance.