In January 2025, businesses using JAMF Pro alongside Microsoft Entra ID for Conditional Access will encounter a significant change that could impact their entire device management strategy. JAMF will discontinue its support for conditional access, a move driven by Microsoft’s transition from the Partner Device Management Legacy API to the new Partner Compliance Management API.
This shift marks a crucial turning point for businesses that have relied on the seamless integration of JAMF with Microsoft Entra ID to enforce conditional access policies, which are fundamental to maintaining a robust Zero Trust security framework.
Understanding Conditional Access and Its Role in Security
Conditional access policies are essential for modern security practices, particularly within the Zero Trust model. These policies ensure that access to corporate resources is granted only when specific, predefined conditions are met, such as device compliance, user identity verification, and other security factors.
For years, businesses using JAMF for macOS device management could enforce these policies directly within JAMF, offering a streamlined and secure approach to managing Apple devices. This integration made JAMF a preferred solution for organizations heavily invested in the Apple ecosystem.
The Impending Change: JAMF’s Discontinuation of Conditional Access Support
However, with the upcoming changes set for January 2025, JAMF users will need to adapt to a new reality. As JAMF phases out its support for conditional access, businesses must now integrate JAMF with Microsoft Intune to continue enforcing these critical security policies. This transition, driven by Microsoft’s shift to the Partner Compliance Management API, necessitates additional engineering work, which could introduce new challenges, costs, and operational complexities.
Evaluating the Impact: The Case for Consolidation
For many businesses, this development raises a fundamental question: Is it still worthwhile to maintain JAMF as a separate MDM solution when Microsoft Intune already offers comparable capabilities, especially for managing macOS devices?
The duplicative nature of maintaining two MDM solutions—JAMF for Apple devices and Intune for Windows devices—may no longer be justifiable. In fact, the requirement to integrate JAMF with Intune not only increases operational complexity but also presents potential risks, such as integration issues, that could disrupt business continuity.
The Business Decision: To Integrate or Consolidate?
As the January 2025 deadline approaches, groups must make a strategic decision. Continuing with JAMF will require significant investment in integration efforts, alongside the ongoing management of dual MDM systems.
On the other hand, consolidating device management under Intune offers a more streamlined, cost-effective, and potentially more secure approach. Intune has evolved to provide robust macOS management capabilities, which may diminish the need for JAMF in many environments.
Long-Term Strategy: Preparing for the Future of Device Management
Businesses should not view this transition as merely a technical challenge but as an opportunity to reassess their long-term device management strategy. The decision to continue managing separate MDM solutions or to consolidate under Intune will have lasting implications for security, operational efficiency, and cost management.
While transitioning to Intune may involve a period of adjustment, it could ultimately provide a more cohesive and integrated approach to managing a diverse device ecosystem.
Conclusion: Making Informed Decisions in a Changing Landscape
As businesses navigate these changes, it’s crucial to evaluate whether the benefits of JAMF still outweigh the challenges and risks associated with its continued use alongside Intune. By carefully considering their options, groups can make informed decisions that align with their security posture, operational goals, and future-proof their device management strategy in an evolving technological landscape.
The upcoming changes are more than just a shift in technology; they represent a broader transformation in how businesses manage and secure their devices. By staying ahead of these developments, businesses can ensure they are well-positioned to maintain robust security while streamlining their operational efficiency.