JAMF
With Jamf, IT and security teams are able to confidently manage and protect the devices, data and applications used by their end-users without getting in the way of the intended Apple experience.
Connect JAMF with Devo SOAR
Navigate to Automations > Integrations.
Search for JAMF.
Click Details, then the + icon. Enter the required information in the following fields.
Label: Enter a connection name.
Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
Remote Agent: Run this integration using the Devo SOAR Remote Agent.
JAMF Server URL: Server URL to connect to the JAMF API. Example 'https://yourServer.jamfcloud.com'.
Username: Username for the JAMF API.
Password: Password for the JAMF API.
After you've entered all the details, click Connect.
Find All Computers
Find all computers.
Output
JSON containing the following items:
``` {json}{ "error":null, "has_error":false, "id":77, "name":"Test’s Temp Machine" }
## Find a Computer Command
Finds a computer command by UUID.
### Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required |
| :--------- | :-------------------------------------------------------------- | :------- |
| UUID | [Jinja-templated](doc:jinja-template) text containing the UUID. | Required |
### Output
JSON containing the following items:
``` {json}{
"computer_command":{
"general":{
"date_sent_utc":"2023-06-07T18:13:52.158+0000",
"date_sent":"2023-06-07 18:13:52",
"profile_udid":"",
"profile_id":-1,
"date_sent_epoch":1686123456158,
"uuid":"asdfasdf-sdfa-fdsa-dasd-asdfasdfasdf",
"apns_result_status":"",
"command":"InstalledApplicationList"
},
"computers":{
"computer":{
"management_id":"asdfasdf-fdsa-sadf-asdf-asdfasdf",
"serial_number":"SODFJHG",
"id":99,
"udid":"asdfsdf-asdf-dfas-fdsad-asdfasdfsad"
},
"size":1
}
},
"error":null,
"has_error":false
}
Creates a New Computer Command Using Command Name And Device IDs
Creates a new computer command using command name and device IDs. Issuing a DeviceLock and EraseDevice command requires a 6 character passcode.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Command | Jinja-templated text containing the Command. Example 'DeviceLock'/'EraseDevice' | Required |
Computer ID | Jinja-templated text containing the Computer ID - supports comma separated values. Example '8,10,55' | Required |
Passcode | Jinja-templated text containing the Passcode to apply to device. | Required |
Output
JSON containing the following items:
``` {json}{ "message":"Created successfully", "error":null, "has_error":false }
## Find All Computer Commands
Find all computer commands.
### Output
JSON containing the following items:
``` {json}{
"uuid":"asdfasdf-4e9e-444b-b3c7-asdfsadfsadf",
"command":"InstalledApplicationList",
"has_error":false,
"error":null,
"profile_id":-1,
"computers":{
"computer":{
"id":77,
"ip_address":"172.114.37.92",
"management_id":"asdfasdf-1dd8-4765-9c78-asdfsadfsdaf",
"udid":"asdfsadf-fdsa-asdf-fdsa-asdfsadf",
"users":""
},
"size":1
}
}
Release Notes
v1.0.0
- Introduced integration with 4 actions:Find All Computers
,Find a Computer Command
,Creates a New Computer Command Using Command Name And Device IDs
andFind All Computer Commands
.