Description
Okta created groups differ from Active Directory groups so normal expressions and filters won't work. The steps below provide an expression group claim that can be used.
Setting Up Group Claims for Active Directory Synced Groups in Okta Identity Engine
Navigate to your Okta Identity Engine tenant and go to the admin site.
Go to Applications > Jamf Connect App > Sign On tab.
Select OpenID Connect ID Token and click Edit.
In this setting, we can create a groups claim to get a specific group to grab in the ID token for privilege elevation.
For "Groups claim type" enter: Expression
For "Groups claim filter" enter groups followed by:
Groups.startsWith("active_directory","NAMEOFGROUPHERE",100)
Test the privilege elevation setup and confirm that the user is apart of the group and can elevate.
More Resources
Additional information on privilege elevation can be found in the links below depending on what version/software you are using.
For use with Self Service+: Configuring macOS Privilege Elevation using Self Service+
For use with Jamf Connect menu bar 2.45.x or earlier: Configuring macOS Privilege Elevation using Jamf Connect