Document toolboxDocument toolbox

JAMF

With Jamf, IT and security teams are able to confidently manage and protect the devices, data and applications used by their end-users without getting in the way of the intended Apple experience.

Connect JAMF with Devo SOAR

  1. Navigate to Automations > Integrations.

  2. Search for JAMF.

  3. Click Details, then the + icon. Enter the required information in the following fields.

  4. Label: Enter a connection name.

  5. Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.

  6. Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).

  7. Remote Agent: Run this integration using the Devo SOAR Remote Agent.

  8. JAMF Server URL: Server URL to connect to the JAMF API. Example 'https://yourServer.jamfcloud.com'.

  9. Username: Username for the JAMF API.

  10. Password: Password for the JAMF API.

  11. After you've entered all the details, click Connect.

Find All Computers

Find all computers.

Output

JSON containing the following items:

``` {json}{ "error":null, "has_error":false, "id":77, "name":"Test’s Temp Machine" }

## Find a Computer Command Finds a computer command by UUID. ### Input Field Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection. | Input Name | Description | Required | | :--------- | :-------------------------------------------------------------- | :------- | | UUID | [Jinja-templated](doc:jinja-template) text containing the UUID. | Required | ### Output JSON containing the following items: ``` {json}{ "computer_command":{ "general":{ "date_sent_utc":"2023-06-07T18:13:52.158+0000", "date_sent":"2023-06-07 18:13:52", "profile_udid":"", "profile_id":-1, "date_sent_epoch":1686123456158, "uuid":"asdfasdf-sdfa-fdsa-dasd-asdfasdfasdf", "apns_result_status":"", "command":"InstalledApplicationList" }, "computers":{ "computer":{ "management_id":"asdfasdf-fdsa-sadf-asdf-asdfasdf", "serial_number":"SODFJHG", "id":99, "udid":"asdfsdf-asdf-dfas-fdsad-asdfasdfsad" }, "size":1 } }, "error":null, "has_error":false }

Creates a New Computer Command Using Command Name And Device IDs

Creates a new computer command using command name and device IDs. Issuing a DeviceLock and EraseDevice command requires a 6 character passcode.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name

Description

Required

Input Name

Description

Required

Command

Jinja-templated text containing the Command. Example 'DeviceLock'/'EraseDevice'

Required

Computer ID

Jinja-templated text containing the Computer ID - supports comma separated values. Example '8,10,55'

Required

Passcode

Jinja-templated text containing the Passcode to apply to device.

Required

Output

JSON containing the following items:

``` {json}{ "message":"Created successfully", "error":null, "has_error":false }

## Find All Computer Commands Find all computer commands. ### Output JSON containing the following items: ``` {json}{ "uuid":"asdfasdf-4e9e-444b-b3c7-asdfsadfsadf", "command":"InstalledApplicationList", "has_error":false, "error":null, "profile_id":-1, "computers":{ "computer":{ "id":77, "ip_address":"172.114.37.92", "management_id":"asdfasdf-1dd8-4765-9c78-asdfsadfsdaf", "udid":"asdfsadf-fdsa-asdf-fdsa-asdfsadf", "users":"" }, "size":1 } }

Release Notes

  • v1.0.0 - Introduced integration with 4 actions: Find All Computers, Find a Computer Command, Creates a New Computer Command Using Command Name And Device IDs and Find All Computer Commands.