Skip to content

jamf_pro: fix instructions for Header Authentication configuration #11819

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 0 commits into from
Nov 22, 2024

Conversation

efd6
Copy link
Contributor

@efd6 efd6 commented Nov 22, 2024

Proposed commit message

The current instructions state that the Jamf webhook should be configured with a JSON object withe the auth header name in "Authorization" and the auth token in "Token". According to Jamf, this is not correct. The headers are apparently constructed from the object such that the key is the header name and the value is the header value. Reflect this in the instructions.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@efd6 efd6 added bugfix Pull request that fixes a bug issue Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] Integration:jamf_pro Jamf Pro labels Nov 22, 2024
@efd6 efd6 self-assigned this Nov 22, 2024
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

Package jamf_pro 👍(0) 💚(1) 💔(1)

Expand to view
Data stream Previous EPS New EPS Diff (%) Result
inventory 6666.67 5319.15 -1347.52 (-20.21%) 💔

To see the full report comment with /test benchmark fullreport

@elasticmachine
Copy link

💚 Build Succeeded

cc @efd6

Copy link

@efd6 efd6 marked this pull request as ready for review November 22, 2024 01:18
@efd6 efd6 requested a review from a team as a code owner November 22, 2024 01:18
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.
The jamf documentation on webhooks states otherwise, but I see same issue being reported in few places and the user got it working with this updated setup in #11759 (comment)

@efd6
Copy link
Contributor Author

efd6 commented Nov 22, 2024

The Jamf documentation is ambiguous, rather than contradictory to this change.

@efd6 efd6 merged commit b22ea4e into elastic:main Nov 22, 2024
5 checks passed
@elastic-vault-github-plugin-prod

Package jamf_pro - 0.1.2 containing this change is available at https://epr.elastic.co/package/jamf_pro/0.1.2/

harnish-crest-data pushed a commit to chavdaharnish/integrations that referenced this pull request Feb 4, 2025
…lastic#11819)

The current instructions state that the Jamf webhook should be
configured with a JSON object withe the auth header name in
"Authorization" and the auth token in "Token". According to Jamf, this
is not correct. The headers are apparently constructed from the object
such that the key is the header name and the value is the header value.
Reflect this in the instructions.
harnish-crest-data pushed a commit to chavdaharnish/integrations that referenced this pull request Feb 5, 2025
…lastic#11819)

The current instructions state that the Jamf webhook should be
configured with a JSON object withe the auth header name in
"Authorization" and the auth token in "Token". According to Jamf, this
is not correct. The headers are apparently constructed from the object
such that the key is the header name and the value is the header value.
Reflect this in the instructions.
@efd6 efd6 deleted the 11759-jamf_pro branch February 5, 2025 22:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bugfix Pull request that fixes a bug issue Integration:jamf_pro Jamf Pro Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[jamf_pro]: Webhook authentication example is wrong
3 participants