Skip to main content

Understanding macOS Catalina and Jamf Connect

With the announcement of macOS Catalina for on-premises Active Directory users at 2019 WWDC, there has been a fair bit of confusion regarding Jamf Connect.

I’d love to clear it up!

Jamf is pleased to report that Jamf Connect is still working exactly as it has in the past. Specifically, if you are using cloud identity, all the benefits of Jamf Connect are exactly the same: you will still enjoy seamless sign-on with your cloud identity credentials and enhanced security with multifactor authentication. With Jamf Connect, an end user can still unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of credentials. You can still simplify your job and the login process for your users with:

  • Synchronized passwords across one user’s experience with Okta, Microsoft Azure and PingFederate identities
  • Provisioning and empowering users without compromising security
  • Offering multifactor and smart card authentication
  • Enjoying just-in-time local user creation

The customers who will see a difference are those using on-prem Active Directory. If you are using on-prem Active Directory, macOS Catalina simply introduces additional functionality — including the ability to automatically authenticate to Active Directory credentials for certain services, such as websites and apps.

Jamf has created an infographic to help users understand exactly how Jamf Connect, NoMAD, and Catalina work together to clear things up:

If you’d like a larger version of the image as a .pdf, please download it below.

For more information on Jamf Connect and how it works within the complexities of the modern workplace, please see our video introducing and explaining Jamf Connect, our product documentation white paper, our white paper on security and cloud identity, our Jamf Connect Q&A or this blog post outlining our new Ping Identity integration availability.