Pre-filling primary account information with Google SSO/LDAP


A follow-up to this ticket, but different enough I wanted to start anew.

Essentially, we're trying to do zero-touch with our next batch of MacBooks, so I've been working on a new Enrollment Profile. We want to primary account information (name and username) to be filled-in and locked during setup. Initially we tried to pull the data via prestage (see prior ticket), but since that isn't working, we tried via Google SSO and Secure LDAP:

I followed these directions for the Google SSO:

Along with adding the SSO pane to the prestage. The pane seemed to work fine — asked for login, went through two-factor authentication, continued the setup afterword — but it never passed the variables to the Create a Computer Account screen, so the name and the username were still blank. I tried both Custom Details and Device Owner's Details in the Pre-fill Primary Account Information, neither worked.

So then I tried using the Google Secure LDAP Integration using the directions here and on Google:

If I go to 
System Settings >> Cloud Identity Providers >> [name of Google LDAP] and run a test, I can see information for particular users, so I know it at least partially worked. But when I set that up as a pane in the prestage, I can't get past the password of my Google account — it doesn't seem to recognize it.

I only need one of these to work, so if anyone has any thoughts on where I may have gone wrong in either direction, I'd appreciate it. I'm happy to give more specific details about my setup if it helps.

Matthew Prins -- Jamf Scripts @ Github

Release Candidate Programs Tester

You actually need both to work.  The SSO gives you the authentication part, so that the user can authenticate to enroll the device.  You then need to cloud identity provider so that Jamf can look up the user that authenticated in your directory.  You'll need to make sure that the mapping is correct (so that a lookup on the username or email returns the correct user value).  I haven't set up Google, but with Azure the user signs in with their userPrincipalName (e.g., but I map the Jamf User Name to the Azure mailNickname attribute.  This gives me the everything up to the @ as the Jamf username (and therefore short name for the local user account in macOS).


One thing I found in my testing is to make sure you have a test account, that is not also a Jamf Pro admin account.  I found that if a user with the same username already exists as a Jamf Pro admin, the cloud LDAP lookup will fail.


Hope this helps!

@jcarr wrote:

You actually need both to work. 

One thing I found in my testing is to make sure you have a test account, that is not also a Jamf Pro admin account.

Those were two pieces of info I needed — thanks! Still having some mapping issues, but I'm seeing the email address at least in the username field, just not the full name in the name box. I'll play around with this when I have some time, but it's at least transferring *something* now.
Found this, which might be useful for anyone in the future trying to set this up:

Matthew Prins -- Jamf Scripts @ Github

New Contributor


You should check mappings in SSO or LDAP authentication, whatever you use, what type username is set for authentication, full email (with or just a user name (without

Also, if you using SSO with MFA, try temporarily to disable MFA for that account and test it, I remember reading somewhere about the issues with MFA and SSO. 


Contributor II

We had the same issue, we ended up using LDAP for auth and Mappings. This resolved the autofill issues for us. this is just a hold over until we switch to Okta/jamf connect as it skips 2 factor using this method.