{"id":75954,"date":"2023-05-17T13:04:51","date_gmt":"2023-05-17T17:04:51","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75954"},"modified":"2024-01-30T11:55:54","modified_gmt":"2024-01-30T16:55:54","slug":"create-mac-application-privacy-preferences-policy","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy","title":{"rendered":"Create a Mac Application Privacy Preferences Policy"},"content":{"rendered":"\n

Some macOS apps need additional privacy permissions to work correctly. The Application Privacy Preferences policy lets you preapprove permissions for system services for a specific app. Preapproving these services saves you time when managing Apple devices with Mobile Device Manager (MDM) because you don\u2019t have to ask the end user to handle approvals. <\/p>\n\n\n\n

This policy requires three pieces of identifying information for each service that you want to preapprove: a code-signing block, a Bundle ID, and approval of the privacy preferences.<\/p>\n\n\n\n

After you create an Application Privacy Preferences Policy and apply it to a device or device group, the policy appears in System Settings > Privacy & Security > Profiles<\/strong>. The policy does not appear in\u00a0System Settings > Privacy & Security > Full Disk Access<\/strong>. That location contains policies that the user approves, rather than Admin-approved policies like the Application Privacy Preferences Policy.\u00a0<\/p>\n\n\n\n

<\/p><\/div>

Tip:<\/strong> \n

You must apply this policy after you upgrade or install macOS 13 Ventura.  Applying the policy before the device has Ventura installed causes the policy to not be recognized.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n

Creating a Policy to Control Privacy Preferences<\/h2>\n\n\n\n

The Application Privacy Preferences policy can only be applied to macOS devices. After you create the policy, you must relaunch the app.<\/p>\n\n\n\n

To create a Application Privacy Preferences policy<\/strong>:<\/p>\n\n\n\n

    \n
  1. Log in to the Admin Portal: https:\/\/console.jumpcloud.com\/login<\/a>.<\/li>\n\n\n\n
  2. Go to DEVICE MANAGEMENT > Policy Management<\/strong>.<\/li>\n\n\n\n
  3. In the All<\/strong> tab, click (+<\/strong>).<\/li>\n\n\n\n
  4. On the New Policy panel, select the Mac<\/strong> tab.<\/li>\n\n\n\n
  5. Select Application Privacy Preferences Policy<\/strong> from the list, then click configure<\/strong>.<\/li>\n\n\n\n
  6. (Optional) On the New Policy panel, enter a new name for the policy or keep the default. Policy names must be unique.<\/li>\n\n\n\n
  7. Under Code Requirement<\/strong>, paste the code-signing block. See Gathering the Code-Signing Block<\/a> for instructions.\"PPPCpolicy.png\"<\/li>\n\n\n\n
  8. Under Identifier<\/strong>, enter the Bundle ID or the path to the binary for the app. See Locating the Bundle ID or Binary Path<\/a> for instructions.<\/li>\n\n\n\n
  9. Under Identifier Type<\/strong>, choose BundleID<\/strong>. If you are using the binary path, choose Path<\/strong>.<\/li>\n\n\n\n
  10. Skip the Static Code checkbox<\/strong>, and do not select it.<\/li>\n\n\n\n
  11. Under Privacy Preferences<\/strong>, select the checkbox for each type of access required for this app. This action preapproves the required privileges for the app. See Approving Privacy Preferences Services<\/a> for instructions.<\/li>\n\n\n\n
  12. (Optional) Select the Device Groups<\/strong> tab. Select one or more device groups where you’ll apply this policy. For device groups with multiple OS member types, the policy is applied only to the supported OS.<\/li>\n\n\n\n
  13. (Optional) Select the Devices<\/strong> tab. Select one or more devices where you’ll apply this policy.<\/li>\n\n\n\n
  14. Click save<\/strong>.<\/li>\n\n\n\n
  15. If prompted, click save<\/strong> again.<\/li>\n\n\n\n
  16. Relaunch the app. See the policy\u2019s Behavior<\/strong> field for more information.<\/li>\n<\/ol>\n\n\n\n

    Gathering the Code-Signing Block<\/h3>\n\n\n\n

    MacOS devices rely on code-signing information to identify apps that access key resources. Every signed, compiled app on macOS has a code signature that identifies the process that is running the app. Only signed apps can access these key system services, and only signed apps can run on Apple silicon Macs.<\/p>\n\n\n\n

    To gather the code block necessary for this policy, you need to run a command on a device where the app is installed. From that device, the codesign<\/code> command can identify the signature of the device:
    Codesign -dr – \/path\/to\/application\/program.app<\/code><\/p>\n\n\n\n

    For example, to run this against the JumpCloud Menu Bar Extra app, you\u2019ll copy everything after designated =><\/code> and paste that into the Code Requirement field in the JumpCloud Application Privacy Preferences Policy:<\/p>\n\n\n\n

    username@demo-system \/Users % codesign -dr – \/Applications\/Jumpcloud.app
    Executable=\/Applications\/Jumpcloud.app\/Contents\/MacOS\/Jumpcloud
    designated => identifier “com.jumpcloud.jcagent-tray” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] \/* exists *\/ and certificate leaf[field.1.2.840.113635.100.6.1.13] \/* exists *\/ and certificate leaf[subject.OU] = N985MXSH85<\/code><\/p>\n\n\n\n

    Locating the Identifier & Identifier Type<\/h3>\n\n\n\n

    When an app runs on macOS, it represents itself to the system either as a reverse-domain string called a Bundle ID (com.jumpcloud.jcagent-tray<\/code>) or as a path to the app itself (\/Applications\/JumpCloud.app\/Contents\/MacOS\/Jumpcloud<\/code>). You’ll need to supply either the Bundle ID or the path to the binary for the app you want to approve. <\/p>\n\n\n\n

    If you are unsure what the Bundle ID is for the app, you can use the defaults<\/code> command in Terminal to find it: 
    defaults read \/Applications\/Jumpcloud.app\/Contents\/Info.plist CFBundleIdentifier<\/code><\/p>\n\n\n\n

    After you have the Bundle ID, you can set the Identifier to the Bundle ID string and then set the Identifier Type to Bundle ID in the policy. If you need to set the Bundle ID field to the path of the binary, supply the path of the binary and change the Identifier Type to Path. <\/p>\n\n\n\n

    Approving Privacy Preferences Services<\/h3>\n\n\n\n

    After you gather the app\u2019s code-signing block and the Bundle ID, choose which privilege areas to approve.<\/p>\n\n\n\n

    MacOS has fairly strict controls regarding app access to user data, including calendars and emails all the way to key files like the user\u2019s Desktop and Documents folders. There are several areas of functionality that can be preapproved by Admins for individual apps. These areas, called services, allow you to approve access to an app without asking the end user to handle the approvals for these services.<\/p>\n\n\n\n

    Approving only the necessary services for a given app ensures that the principle of least privilege is being honored, and you can allow users to grant or restrict further privileges with their own actions. <\/p>\n\n\n\n

    JumpCloud lets you approve the following list of services.<\/p>\n\n\n\n

    Accessibility<\/strong>
    Apple\u2019s Accessibility service is a powerful subsystem that allows apps to perform additional functions on behalf of the user, including running scripts and system commands. Frequently, this service is used to perform automations. <\/p>\n\n\n\n

    Address Book<\/strong>
    The native Address Book, and its CardDAV accounts, is a protected area on macOS. Allowing access to the Address Book allows an app to read and write the contents of the Address Book without prompting the user. This could compromise privacy for the end user.<\/p>\n\n\n\n

    Calendar<\/strong>
    The native Calendar, and its CalDAV, Exchange, and Google accounts, is a protected area on macOS. Allowing access to the Calendar allows an app to read and write the contents of the Calendar without prompting the user. This could have privacy compromises for the end user.<\/p>\n\n\n\n

    Allow Access to File Providers<\/strong>
    File Providers are special apps in macOS that handle local copies of files synced to a cloud service like Dropbox or OneDrive. Allowing access to File Providers ensures that File Provider apps will be able to write to the local disk. This is an expected part of their operation, but still needs to be approved by the end user or the Admin must apply this policy.<\/p>\n\n\n\n

    Allow Access to Media Library<\/strong>
    The Apple Media Library functionality encompasses the user\u2019s Photos library, iMovie library, and Apple Music library. As these locations are sensitive, apps cannot use these sources without permission.<\/p>\n\n\n\n

    Allow Access to Photos<\/strong>
    The Apple Photos app has its own library format, and access to the system Photos library is gated by the Privacy Preferences subsystem. This policy allows an app to select user photos without first getting permission from the user.<\/p>\n\n\n\n

    Allow Access to Reminders<\/strong>
    The Apple Reminders app has a database of reminders, and access to the database is gated by the Privacy Preferences subsystem. This policy allows an app to access the database of reminders without first getting permission from the user.<\/p>\n\n\n\n

    Allow Access to SpeechRecognition<\/strong>
    Apple\u2019s Siri Speech Recognition service allows users to dictate text to their device in a text field and have the operating system translate their speech into text. This service? requires internet access and microphone access. Microphone access must be approved by the end user for this to work correctly. <\/p>\n\n\n\n

    Allow Access to All Files<\/strong>
    Many directories inside and outside the read-only macOS Sealed System Volume (SSV) are protected from unauthorized access by the Privacy Preferences subsystem. Allowing an app to read and write (if outside the macOS SSV) these files grants access that is fairly broad. Security tool apps frequently require this level of access.<\/p>\n\n\n\n

    Allow Access to the Desktop Folder<\/strong>
    A user\u2019s Desktop folder may contain sensitive information. Allowing an app to read and write files on the user\u2019s Desktop will gives it full control over those files. <\/p>\n\n\n\n

    Allow Access to the Documents Folder<\/strong>
    A user\u2019s Documents folder can contain sensitive information. Allowing an app to read and write files in the user\u2019s Documents folder gives it full control over those files. <\/p>\n\n\n\n

    Allow Access to the Downloads Folder<\/strong>
    A user\u2019s Downloads folder can contain sensitive information. Allowing an app to read and write files in the user\u2019s Downloads folder gives it full control over those files. <\/p>\n\n\n\n

    Allow Access to Network Volumes<\/strong>
    Network Volumes can contain organizationally sensitive information. Allowing an app to read and write files on Network Volumes gives it full control over the files on Network Volumes that the logged-in user can view and write.<\/p>\n\n\n\n

    Allow Access to Detachable Media<\/strong>
    Detachable Media\u2013external disks and disk images\u2013can contain sensitive information. Allowing an app to read and write files on Detachable Media gives it full control over the files on Detachable Media that the logged-in user can view and write.<\/p>\n\n\n\n

    Allow Access to SysAdmin Files<\/strong>
    Some files related to the administration of a macOS device are protected by this permission, including files that protect the authentication systems of macOS. Allowing access to these files grants access that is fairly broad. Security tool apps frequently require this level of access.<\/p>\n\n\n\n

    Allow App to Update Applications <\/strong>(Requires macOS13+)
    An app bundle stores everything that an app requires for successful operation. Allow this app to replace or update other apps on the device. Available in macOS 13 and later.<\/p>\n\n\n\n

    Example<\/h2>\n\n\n\n

    This example describes the steps to set up access to the Alfred<\/a> app, a productivity app for macOS that lets users automate tasks on their device. The app requests access to Address Book, Accessibility, and All Files. <\/p>\n\n\n\n

    To set up access to the Alfred<\/a> app:<\/p>\n\n\n\n

      \n
    1. Verify that the Alfred app is installed on a macOS device.<\/li>\n\n\n\n
    2. Gather the code block for Alfred. See Gathering the Code-Signing Block<\/a>.<\/li>\n\n\n\n
    3. On the device where Alfred is installed, run this command in Terminal:<\/li>\n<\/ol>\n\n\n\n

      codesign -dr – \/Applications\/Alfred\\ 4.app <\/code><\/p>\n\n\n\n

      The command result displays:
      Executable=\/Applications\/Alfred 4.app\/Contents\/MacOS\/Alfred
      designated => anchor apple generic and identifier “com.runningwithcrayons.Alfred” and (certificate leaf[field.1.2.840.113635.100.6.1.9] \/* exists *\/ or certificate 1[field.1.2.840.113635.100.6.2.6] \/* exists *\/ and certificate leaf[field.1.2.840.113635.100.6.1.13] \/* exists *\/ and certificate leaf[subject.OU] = XZZXE9SED4)<\/code><\/p>\n\n\n\n

        \n
      1. Copy everything after the designated =><\/code>. For example:<\/li>\n<\/ol>\n\n\n\n

        anchor apple generic and identifier “com.runningwithcrayons.Alfred” and (certificate leaf[field.1.2.840.113635.100.6.1.9] \/* exists *\/ or certificate 1[field.1.2.840.113635.100.6.2.6] \/* exists *\/ and certificate leaf[field.1.2.840.113635.100.6.1.13] \/* exists *\/ and certificate leaf[subject.OU] = XZZXE9SED4)<\/code><\/p>\n\n\n\n

          \n
        1. In JumpCloud’s Application Privacy Preferences Policy, paste that content into the Code Block section. For instructions on creating this policy, see Creating a Policy to Control Privacy Preferences<\/a>.<\/li>\n\n\n\n
        2. Use the defaults<\/code> command to locate the CFBundleIdentifier<\/code> from Alfred\u2019s info.plist<\/code> file:<\/li>\n<\/ol>\n\n\n\n

          defaults read \/Applications\/Alfred\\ 4.app\/Contents\/Info.plist CFBundleIdentifier<\/code><\/p>\n\n\n\n

          The app\u2019s identifier displays:<\/p>\n\n\n\n

          com.runningwithcrayons.Alfred<\/code><\/p>\n\n\n\n

            \n
          1. Copy the identifier from Step 6 into the Identifier<\/strong> field in the JumpCloud Application Privacy Preferences Policy.<\/li>\n<\/ol>\n\n\n\n

            <\/p><\/div>

            Tip:<\/strong> \n

            If you need to use the binary path instead of the Bundle ID, supply the binary path here and change the Identifier Type <\/strong>to Path<\/strong> in the next step.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n

              \n
            1. Under Identifier Type<\/strong>, choose Bundle<\/strong>.<\/li>\n\n\n\n
            2. The Alfred app needs access to Address Book, Accessibility, and All Files, so you must select these three checkboxes in the policy. <\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

              Some macOS apps need additional privacy permissions to work correctly. The Application Privacy Preferences policy lets you preapprove permissions for […]<\/p>\n","protected":false},"author":202,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[2925,2852,2862,3082],"support_tag":[],"coauthors":[2836],"acf":[],"yoast_head":"\nCreate a Mac Application Privacy Preferences Policy - JumpCloud<\/title>\n<meta name=\"description\" content=\"Learn to create a Mac Application Privacy Preferences Policy so that you can preapprove permissions for system services for a specific app.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Create a Mac Application Privacy Preferences Policy\" \/>\n<meta property=\"og:description\" content=\"Learn to create a Mac Application Privacy Preferences Policy so that you can preapprove permissions for system services for a specific app.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-30T16:55:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"denasteward\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy\",\"url\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy\",\"name\":\"Create a Mac Application Privacy Preferences Policy - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#primaryimage\"},\"thumbnailUrl\":\"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP\",\"datePublished\":\"2023-05-17T17:04:51+00:00\",\"dateModified\":\"2024-01-30T16:55:54+00:00\",\"description\":\"Learn to create a Mac Application Privacy Preferences Policy so that you can preapprove permissions for system services for a specific app.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#primaryimage\",\"url\":\"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP\",\"contentUrl\":\"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\/\/jumpcloud.com\/support\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Create a Mac Application Privacy Preferences Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Create a Mac Application Privacy Preferences Policy - JumpCloud","description":"Learn to create a Mac Application Privacy Preferences Policy so that you can preapprove permissions for system services for a specific app.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy","og_locale":"en_US","og_type":"article","og_title":"Create a Mac Application Privacy Preferences Policy","og_description":"Learn to create a Mac Application Privacy Preferences Policy so that you can preapprove permissions for system services for a specific app.","og_url":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy","og_site_name":"JumpCloud","article_modified_time":"2024-01-30T16:55:54+00:00","og_image":[{"url":"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes","Written by":"denasteward"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy","url":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy","name":"Create a Mac Application Privacy Preferences Policy - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#primaryimage"},"thumbnailUrl":"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP","datePublished":"2023-05-17T17:04:51+00:00","dateModified":"2024-01-30T16:55:54+00:00","description":"Learn to create a Mac Application Privacy Preferences Policy so that you can preapprove permissions for system services for a specific app.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#primaryimage","url":"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP","contentUrl":"https:\/\/support.jumpcloud.com\/servlet\/rtaImage?eid=ka06S000000tJrn&feoid=00N1M00000F5H4z&refid=0EM6S000003ZSNP"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/support\/create-mac-application-privacy-preferences-policy#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/jumpcloud.com\/support"},{"@type":"ListItem","position":3,"name":"Create a Mac Application Privacy Preferences Policy"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support\/75954"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/support"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/202"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support\/75954\/revisions"}],"predecessor-version":[{"id":104448,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support\/75954\/revisions\/104448"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=75954"}],"wp:term":[{"taxonomy":"support_category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support_category?post=75954"},{"taxonomy":"support_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/support_tag?post=75954"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=75954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}