Posted on 10-04-2018 01:31 PM
Hi , we are trying to setup SSO and ran into an issue where users in an ldap group are not recognized and get access denied. Only ldap users directly added to JSS are recognized and signed in.
Any idea how this can be solved ?
thanks
Posted on 11-08-2018 07:47 AM
Bump. Running into same issue, just posted a thread about it.
Any progress on your end, @anniwayy ?
Posted on 11-08-2018 11:58 AM
Unfortunately not, but we have a working case. When we find the solution i will posted here.
:-)
Posted on 11-14-2018 07:41 AM
you need to make sure you are adding ldap groups to Jamf as well as on the identity provider access side. keep in mind they are case sensitive
Posted on 11-14-2018 07:12 PM
I think this is a known issue, you should reach out to Jamf..
C
Posted on 11-30-2018 10:01 AM
I've opened a case for this as well with our Jamf Buddy
Posted on 11-30-2018 10:10 AM
My ticket was closed out basically explaining that SSO logins will not do a lookup. Sucks, but explains what I'm seeing. Means managing all access is going to be a manual task on my plate, instead of just being able to set up AD groups and let each department manage their own.
Posted on 02-27-2019 07:11 PM
I have a need for this exact use case, and had also opened a ticket.
The answer was the same, so I have submitted a feature request to get it changed... please vote on it!
https://www.jamf.com/jamf-nation/feature-requests/8404/saml-authentication-+-ldap-authorization
Posted on 02-28-2019 07:54 AM
In our environment I added the LDAP groups directly to Jamf as groups and when a user logs in via SSO (As in redirected to our IDP and then the IDP returns the response back to the SP-Jamf) they are logged in using their active directory username. The groups that this username is a part of are added to Jamf already and permissions are assigned to the groups themselves. Not the users one by one. I'm sorry I had to black out so much but basically these are all LDAP groups(as you see on the right) and after the user utilizes SSO, they are assigned permissions based on their membership to these groups. (Which is defined in active directory, not jamf)
Posted on 02-28-2019 07:58 AM
Thanks @Ctinker
FWIW, that is exactly what we tried to do, and failed. When I opened a support ticket, I was told that SSO would not perform group lookups, and ticket was closed.
Now... the one additional wrinkle that we have is that we're using SSO via smart cards. Maybe that's part of the issue we had. Username/pass logins worked fine, but not when we used our smart cards (CAC/PIV).
Posted on 01-10-2020 07:55 AM
@Ctinker If I read your message right, you're using SSO (what idP?), backed with LDAP groups. This isn't working for me; what did you do to get it working?
Posted on 04-29-2020 11:26 AM
I was able to get this working yesterday, following the documentation here: https://www.jamf.com/jamf-nation/articles/436/configuring-single-sign-on-with-active-directory-federation-services
Here's the setup:
At this point, users who are in the JSS Admins group in AD can log in with their AD credentials. They don't need to be added explicitly as a Jamf Pro user.
At this point:
To get SSO group mapping working:
To find the proper value for the above:
Once I had this in place, I could log into the JSS as a user who is not a Jamf user but who is an AD user in the JSS Admins group.
Posted on 05-19-2020 07:36 PM
... comment removed ...
Caine Hörr
A reboot a day keeps the admin away!
Posted on 07-22-2020 03:27 PM
I believe this only works because you're using AD for your SSO provider, so it's passing group information with the SSO login (so Jamf is seeing that group name, looking at the group list it has assigned, then looking up members of that group to match the user logging in). If you use a separate SSO provider (say, Shibboleth) you may not have that group info present. Jamf doesn't appear to be smart enough to grab that user, check users and groups, see that user is missing, then query ldap/AD for the user's group membership, and allow login based on that...
Posted on 03-19-2024 08:40 PM
Ran into this same issue using Shibboleth as our SSO and the final fix to get it to process the ldap groups properly was to set the Group membership to "urn:mace:dir:attribute-def:memberGroup" (essentially the FQDN)