Streamline Mac authentication and identity management while making Zero Trust Network Access (ZTNA) a reality.
More employees than ever before are working from different locations and on various devices. Jamf Connect enables remote management of users, groups, passwords and access to corporate applications and cloud resources, while safely connecting workers to the devices, apps and data they need to be productive in the modern world. With Jamf, ensure the right users are on compliant devices accessing authorized resources — no matter where they are. This evolved approach to identity and security management eases the burden on IT staff and end users.Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication and access controls:
Account provisioning
Whether it’s during setup or in day-to-day use, Jamf Connect ensures a single cloud identity through Okta or Microsoft Azure is being used to access a user’s device and applications — without the need to bind to Active Directory.
Identity Management
Enable user authentication through single sign-on (SSO) so you don’t have to manage certificates. Keep an eye on all company devices and who is accessing them, when and from what device, providing peace of mind that both the device and corporate information are protected. This is all done without impacting battery life — and operates silently in the background without interfering with the user experience.
Application-based microtunnels
Only connect users to apps they are authorized to access. Microtunnels enforce least privilege access and prevent lateral network movement (a common vector for security breaches).
Risk-aware access policies
Enhance security by preventing access from users and devices that may be compromised.
Password synchronization
Connect ensures a user’s cloud identity passwords are synchronized down to the local account level on the Mac, even when the password is changed
Unified access policy
Spans all hosting locations (on-premises, private and public clouds and SaaS applications), all modern operating systems and all management paradigms.
After a user authenticates on their device, business connections are secured while enabling non-business applications to route directly to the internet, preserving end-user privacy and optimizing network infrastructure. For IT, deploying servers, managing certificates and configuring IP addresses are a thing of the past.