Hello there!

Need Help? We are right here!

miniOrange Email Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Two-Factor Authentication (2FA) for Jamf Connect

Jamf Connect 2FA (Two-Factor Authentication) or Multi-Factor Authentication (MFA) is an additional layer of security in which a user or an organizational employee have to provide two factors to gain access to the Jamf Connect account. With Jamf Connect TFA being enabled, anyone trying to login to your Jamf Connect account from an unrecognized computer/device must provide additional authorization. Authentication starts with a user submitting his traditional username and password. Once the user successfully gets authenticated with the 1st step verification, configured 2FA (OTP over SMS, Push Notifications, Yubikey, TOTP, Google Authenticator etc) method prompts for 2nd-step verification. After successfully authenticating with both of the steps a user is granted with the access to the Jamf Connect account. This extra layer prevents the unauthorized person from accessing the resources even if cyber attackers get to know your credentials.

miniorange provides 15+ authentication methods and solutions for various use cases. It allows users and organizations to set up certain authentication and settings which includes password restrictions, restricting sign-in methods, as well as other security settings. miniorange also makes way for authentication apps that support Time-Based One-Time Password (TOTP) Google Authenticator, Microsoft Authenticator, Authy 2-Factor authentication app and our own miniorange Authenticator app.

Connect with External Source of Users

miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Shibboleth, Ping, Okta, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more.

Apps supported by miniOrange

two factor authentication (2FA) miniOrange authenticator app

Authenticator App

two factor authentication (2FA) google authenticator app

Authenticator App

two factor authentication (2FA) authy authenticator app

Authy 2-Factor
Authentication App

two factor authentication (2FA) Microsoft authenticator app

Authenticator App


Prerequisites for enabling MFA on regular mac login:

  • JAMF Connect Login
  • JAMF Connect Configuration

Follow the Step-by-Step Guide for setting up MFA with JAMF connect configuration.

1. Create an OIDC application in miniOrange

  • Go to miniOrange dashboard and login with your admin account.
  • Select Apps and click on add application.
  • Add new application for MFA on MAC using JAMF Connect

  • In Choose Application Type click on OAUTH/ODIC application type.

  • MultiFactor Authentication for MAC using JAMF Connect select application type

  • In OAUTH/OIDC Protocol and click on OAuth2/OpenID Connect app.

  • MultiFactor Authentication for MAC using JAMF Connect select OAuth Client tab

  • On the Basic settings tab add the following details and Click on Save.

  • Client Name: Jamf Connect
    Redirect URL:

  • Click on the select button in the left and click on edit button of the recently created application.

  • MultiFactor Authentication for MAC using JAMF Connect select application type

  • Copy the Client ID and Client Secret for later Use.

  • MultiFactor Authentication for MAC using JAMF Connect select application type

  • Copy the discovery URL from the applications menu and click on OAuth Endpoints.
  • Example Discover URL: https://branding.xecurify.com/moas/discovery/v2.0/lXDwTpNI6ymPcRI/.well-known/openid-configuration

  • MultiFactor Authentication for MAC using JAMF Connect select application type

2. Configure JAMF connect

  • Open JAMF Connect application in the Applications for creating a configuration profile (A configuration profile contains details of your identity provider from where your user authentication needs to be done)
  • Choose Custom in the identity provider and paste the OIDC ID we got from the miniOrange settings.
  • Enter the same value in the ROPG cliend ID.
  • Enter the Client Secret we got from miniOrange.
  • Enter the Discovery URL in the Discovery URL field.
  • In the Redirect URL field enter
  • MultiFactor Authentication for MAC using JAMF Connect select application type

  • Do not enter any values in the Scopes.
  • In the Login tab, enable the Allow local authentication if a network unavailable, this will give you the local authentication option in case if the IDP is not reachable.

  • Test the configuration with the top right button if everything is working fine then save these configuration with mobileconfig extension. This configuration profile can be pushed in the machines in which you want to add the mfa/sso.

3. Install the configuration file and enable OIDC login:

  • Open the configuration file you created with the above steps.
  • Install the file by giving the permissions

  • MultiFactor Authentication for MAC using JAMF Connect select application type

  • Once the installation is done open the terminal.
  • Go to /Library/Security/SecurityAgentPlugins/JamfConnectLogin.bundle/Contents/MacOS/ location for enabling the OIDC authentication with the regular authentication.
  • Run the command authchanger -OIDC

4. Test the configuration:

  • Logout and try to login again it will open a window like below which will forward you for authentication with miniOrange.
  • Enter the IDP credentials to login.

Remove the OIDC authentication (If Required):

  • Additional Steps are provided if the OIDC authentication needs to be Removed or Disabled.
  • To diable the OIDC authentication and re-enable the local authentication go to /Library/Security/SecurityAgentPlugins/JamfConnectLogin.bundle/Contents/MacOS/
  • Run the below command authchanger -reset

External References

Want To Schedule A Demo?

Request a Demo

Our Other Identity & Access Management Products