{"id":54953,"date":"2021-10-05T11:00:00","date_gmt":"2021-10-05T15:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=54953"},"modified":"2024-11-14T19:01:40","modified_gmt":"2024-11-15T00:01:40","slug":"granting-permissions-monterey-pluggable-authentication-modules","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/granting-permissions-monterey-pluggable-authentication-modules","title":{"rendered":"Granting Permissions for Monterey Pluggable Authentication Modules (PAM)"},"content":{"rendered":"\n
Apple\u2019s new operating system, macOS Monterey, is due for release in October. Along with all the usability and feature changes come changes to the underpinnings of macOS. Apple continues to increase security of their operating system and, while this is desirable, it also poses some unique challenges for developers and integrators. <\/p>\n\n\n\n
The most impactful security change for IT Admins in Monterey is a set of new restrictions that Apple has implemented around access to the Pluggable Authentication Module (PAM) directory located at \/etc\/pam.d. <\/p>\n\n\n\n
JumpCloud\u2019s ability to sync your user password to the computer at the login window is an example of a PAM. With macOS Monterey, Apple will require that any process (such as our login mechanism) which requires access to the directory \/etc\/pam.d\/ has the consent of an admin user on the system. Alternatively, consent may be granted by an admin through an MDM profile.<\/p>\n\n\n\n
This may mean you have some necessary actions to take to preserve some core JumpCloud functionality before your end users update to the latest OS. First and foremost, until you have prepared for this, it is recommended that you configure the Block Monterey Installation policy in JumpCloud so that your users don\u2019t jump the gun.<\/p>\n\n\n\n
As an IT professional, you fall into one of these three camps: a) you are using JumpCloud MDM to manage your Mac fleet, b) you are using a third party MDM, or c) you aren’t using any MDM for Monterey MacOS management<\/a>. Below are the steps you can follow to ensure the above functionality is preserved:<\/p>\n\n\n\n If you are using JumpCloud as your MDM<\/a>, you are all set to go. The agent will update in preparation for the impending OS release and that will include granting the permissions necessary to carry out the consent. You won\u2019t have to do a thing. If you have a new install, we will deploy an MDM profile to grant access to the directory at the time of enrollment.<\/p>\n\n\n\n If, however, you are integrating JumpCloud with a separate MDM provider, you will need to manage this event differently. For this use case, the PAM module we use for authorization requires a new permission <\/strong>and you will need to grant access by <\/p>\n\n\n\n If you are not yet managing your macs through Apple MDM at all\u2026 this is a good opportunity to make a change. Timing may be tight, but setting up JumpCloud MDM<\/a> for this task is pretty easy. Sign up for a trial of JumpCloud <\/a>and test it out yourself. <\/p>\n","protected":false},"excerpt":{"rendered":" You have some necessary actions to take before your end users update to the latest OS.<\/p>\n","protected":false},"author":153,"featured_media":48134,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[2418,2423,2422,2435,2388],"collection":[2778,2776],"platform":[],"funnel_stage":[3014],"coauthors":[2518],"acf":[],"yoast_head":"\nJumpCloud MDM<\/h3>\n\n\n\n
Third Party MDM<\/h3>\n\n\n\n
\n
No MDM<\/h3>\n\n\n\n