With Jamf, IT and security teams are able to confidently manage and protect the devices, data and applications used by their end-users without getting in the way of the intended Apple experience.
Connect JAMF with Devo SOAR
Navigate to Automations > Integrations.
Search for JAMF.
Click Details, then the + icon. Enter the required information in the following fields.
Label: Enter a connection name.
Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
Remote Agent: Run this integration using the Devo SOAR Remote Agent.
JAMF Server URL: Server URL to connect to the JAMF API. Example 'https://yourServer.jamfcloud.com'.
Username: Username for the JAMF API.
Password: Password for the JAMF API.
After you've entered all the details, click Connect.
Find All Computers
Find all computers.
Output
JSON containing the following items:
``` {json}{ "error":null, "has_error":false, "id":77, "name":"Test’s Temp Machine" }
## Find a Computer Command Finds a computer command by UUID. ### Input Field Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection. | Input Name | Description | Required | | :--------- | :-------------------------------------------------------------- | :------- | | UUID | [Jinja-templated](doc:jinja-template) text containing the UUID. | Required | ### Output JSON containing the following items: ``` {json}{ "computer_command":{ "general":{ "date_sent_utc":"2023-06-07T18:13:52.158+0000", "date_sent":"2023-06-07 18:13:52", "profile_udid":"", "profile_id":-1, "date_sent_epoch":1686123456158, "uuid":"asdfasdf-sdfa-fdsa-dasd-asdfasdfasdf", "apns_result_status":"", "command":"InstalledApplicationList" }, "computers":{ "computer":{ "management_id":"asdfasdf-fdsa-sadf-asdf-asdfasdf", "serial_number":"SODFJHG", "id":99, "udid":"asdfsdf-asdf-dfas-fdsad-asdfasdfsad" }, "size":1 } }, "error":null, "has_error":false }
Creates a New Computer Command Using Command Name And Device IDs
Creates a new computer command using command name and device IDs. Issuing a DeviceLock and EraseDevice command requires a 6 character passcode.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Command | Jinja-templated text containing the Command. Example 'DeviceLock'/'EraseDevice' | Required |
Computer ID | Jinja-templated text containing the Computer ID - supports comma separated values. Example '8,10,55' | Required |
Passcode | Jinja-templated text containing the Passcode to apply to device. | Required |
Output
JSON containing the following items:
``` {json}{ "message":"Created successfully", "error":null, "has_error":false }
## Find All Computer Commands Find all computer commands. ### Output JSON containing the following items: ``` {json}{ "uuid":"asdfasdf-4e9e-444b-b3c7-asdfsadfsadf", "command":"InstalledApplicationList", "has_error":false, "error":null, "profile_id":-1, "computers":{ "computer":{ "id":77, "ip_address":"172.114.37.92", "management_id":"asdfasdf-1dd8-4765-9c78-asdfsadfsdaf", "udid":"asdfsadf-fdsa-asdf-fdsa-asdfsadf", "users":"" }, "size":1 } }
Release Notes
v1.0.0
- Introduced integration with 4 actions:Find All Computers
,Find a Computer Command
,Creates a New Computer Command Using Command Name And Device IDs
andFind All Computer Commands
.