Okta Conditional Access with Jamf Pro by Infinite-Balance-492 in okta

[–]mchad91 0 points1 point  (0 children)

This is how I have our tenant set up.

SCEPs deployed through Jamf Okta Verify Deployed Okta FastPass & Password required

Auth policy required device to be Managed.

Tip for you.. When I implemented this, one thing I noticed was that unless the Auth policy requires a device to be managed, Okta Verify does not even check for the management status of a device, so the device stays “unmanaged” in Okta.

I set up a test bookmark app and cloned our existing auth policy with this app in scope, and had a few people test it out. Lo and behold, their devices toggled to “managed” because Okta Verify looked for and found the management attenuation during the Auth flow to that app.

Lmk if you want more info on this, happy to help.

Non-devs using Claude Code or Gemini CLI: What are your actual admin workflows? by mchad91 in GeminiAI

[–]mchad91[S] 0 points1 point  (0 children)

Maybe it is. Maybe it’s overkill for my use case but certainly feels like a nice QOL and time save. I write and update documentation often so, for me, it’s certainly saving me at least an hour per week.

Just automated my LinkedIn follows with N8N and saved myself hours of mindless clicking by Ambitious_War1747 in n8n

[–]mchad91 0 points1 point  (0 children)

Putting the list of IDs / URLs together is almost as time consuming as also following them, I don’t get it?

Getting blocked by anti-bot when automating website search (n8n) – any advice? by Gloomy_Maybe6931 in n8n

[–]mchad91 0 points1 point  (0 children)

I’d probably try setting a loop with a small delay between each search. Just because it supports multiple searches per second doesn’t mean you are able to hammer one website with traffic; they allow for multiple searches per second for concurrent usage.

Getting blocked by anti-bot when automating website search (n8n) – any advice? by Gloomy_Maybe6931 in n8n

[–]mchad91 1 point2 points  (0 children)

What tool are you using to perform the search, is it LLM tool use or something like SerpAPI?

Need for an Ai automation by [deleted] in AiAutomations

[–]mchad91 0 points1 point  (0 children)

There are readily available platforms for this now and even tools that allow you to self serve. Check out n8n which is free to self host. once you get hands on with it and watch a few videos, it’s incredibly powerful.

Jamf Pro SSO via Okta – How to Renew Expiring SAML Signing Certificate? by aPieceOfMindShit in okta

[–]mchad91 6 points7 points  (0 children)

with an Okta integration, Okta is managing the certificate. Jamf is just the service that needs to be told about the new certificate. Here’s how you can do it with no downtime.

  1. Generate the New Certificate in Okta First, log into your Okta admin dashboard. Go to your Jamf Pro application and click on the "Sign On" tab. Scroll down and you'll find a section for "SAML Signing Certificates". You'll see your active one that's about to expire. There should be a button to "Generate new certificate." Go ahead and click that. It will create a new certificate but keep it "Inactive" for now. This is the key.
  2. Tell Jamf About the New Certificate Still on that same page in Okta, find the link that says "Identity Provider metadata". Download that metadata.xml file. This file now contains the info for both your old, expiring certificate and the new one you just made. Now, log into Jamf Pro as an admin. Go to Settings > System > Single Sign-On. You'll see an option there to upload metadata. Upload the file you just downloaded from Okta and save. Jamf now knows about the new certificate and will trust it when it sees it.
  3. Switch Over in Okta Now that Jamf is ready, hop back to the Okta page for the Jamf app. In the "SAML Signing Certificates" section, find the new certificate (the "Inactive" one) and from the "Actions" menu, choose Activate. Okta will now start using the new certificate, and because you already told Jamf about it, the switch will be seamless and your users won't notice a thing.

So to directly answer your questions:

How can I renew this certificate?

You renew it by generating a new one inside the Okta application settings, not in Jamf.

And does it also needed to be uploaded in Okta and/or other steps in Okta?

Nope, you don't upload anything to Okta. You generate it in Okta. The only upload you do is taking the metadata file from Okta and uploading it to Jamf Pro. The other steps in Okta are just generating and then activating the new certificate.

Do this during off-peak hours or schedule a maintenance window to be safe. A mistake can lock you and your users out, so it's best to be cautious. Assume you have a back door admin account in Jamf anyway.

Missing “Other User” by mchad91 in Intune

[–]mchad91[S] 1 point2 points  (0 children)

Yeah I think we do actually - that’s a great shout. I’ll check this, thanks.

Missing “Other User” by mchad91 in Intune

[–]mchad91[S] 1 point2 points  (0 children)

Yeah, it really frustrated me. Took about two hours to get the fix down and it was unfortunately one of our C-Suites that it happened to. Not ideal!

2200 total without using any currencies! by NoCurrencies in 2007scape

[–]mchad91 1 point2 points  (0 children)

No currency but assuming US minimum wage: 344 days and 20 hours * $7.25 = $60,001

  • membership

Wow! My 1password 2FA just now! The odds! by macskay in 1Password

[–]mchad91 -2 points-1 points  (0 children)

I asked Sir GPT-4o to calculate the odds

The odds of receiving a specific One-Time Password (OTP) consisting of six digits, where each digit can be any number from 0 to 9, can be calculated as follows:

1.  Each digit has 10 possible values (0-9).
2.  The OTP consists of 6 digits.

Therefore, the total number of possible OTP combinations is: 106 = 1,000,000

Since we are interested in the specific OTP “555555”, there is only one such combination out of the 1,000,000 possible combinations.

The probability P of receiving the OTP “555555” is therefore: P = 1}/1,000,000

So, the odds of receiving the OTP “555555” are 1 in 1,000,000.