-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Specify custom PayloadType #18
Comments
mcxToProfile is for turning MCX or other macOS preference files into
profiles - I don't think that it'd ever take another payload type as
com.apple.ManagedClient.preferences is exactly what it is for.
How would you propose this to work? Taking a generic plist and shoving it
into the payloadtype you've specified?
…On Fri, Nov 10, 2017 at 7:01 AM, eholtam ***@***.***> wrote:
macOS 10.13.2 beta 2 introduces a new MDM PayloadType to manage
whitelisted KEXTs settings only thru UAMDM.
The new KEXT whitelist policy now has a PayloadType of
com.apple.syspolicy.kernel-extension-policy instead of the default
com.apple.ManagedClient.preferences. I'm sure there will be more
PayloadTypes coming down the line as UAMDM seems to be the path for new
security features so having an option to override the default Type would be
handy in the future.
-Eric
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#18>, or mute the thread
<https://github.com/notifications/unsubscribe-auth/AB_BM_zSxIXInv4IiHc8PZMDXccmmBzlks5s1GVXgaJpZM4QZrMa>
.
--
Samuel Keeley
|
Yes, that's how I've been using this tool for some time now. I create a plist of the specific keys that I want in a profile and feed it thru mcxtoprofile. The output is a mobileconfig with the payload of the keys that I provided. I have a PR that appears works for my one use case but I'm very newbish in Python so more eyes on it would be welcomed. |
An example: I have a plist of
I feed that thru mcxtoprofile via That outputs:
|
I can see why you'd want to be able to do this, although we probably could have made an argument for a while to include any of the many other I'm not necessarily opposed to the idea of allowing arbitrary payload types as a flag. However, because this seems (to me, at least) to be one of Apple's ways to extend its management capabilities via config profiles, how can we know that the profiles it would generate using other Payload Types would match other tools from Apple which are also able to generate profiles? One option could be that we state this is an experimental feature and it's just going to set the value to what you want without any other changes to the structure of the data. |
This is definitely experimental. My typical use case for this tool is for non-Apple payloads. I use Apple’s tools (Profile Manager or Configurator) for Apple specific domains to make sure the necessary bits are in the profile. Since I haven’t seen this new kext payload type available in their tools it got me thinking on how to systematically create test profiles.
…-Eric
On Nov 10, 2017, at 3:23 PM, Timothy Sutton ***@***.***> wrote:
I can see why you'd want to be able to do this, although we probably could have made an argument for a while to include any of the many other PayloadTypes which Profile Manager has been able to generate, going on 7 years now. mcxToProfile was originally just meant as a mechanism to do with profiles what we were doing before with MCX, using Apple's managed client support.
I'm not necessarily opposed to the idea of allowing arbitrary payload types as a flag. However, because this seems (to me, at least) to be one of Apple's ways to extend its management capabilities via config profiles, how can we know that the profiles it would generate using other Payload Types would match other tools from Apple which are also able to generate profiles? One option could be that we state this is an experimental feature and it's just going to set the value to what you want without any other changes to the structure of the data.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or mute the thread.
|
macOS 10.13.2 beta 2 introduces a new MDM
PayloadType
to manage whitelisted KEXTs settings only thru UAMDM.The new KEXT whitelist policy now has a PayloadType of
com.apple.syspolicy.kernel-extension-policy
instead of the defaultcom.apple.ManagedClient.preferences
. I'm sure there will be more PayloadTypes coming down the line as UAMDM seems to be the path for new security features so having an option to override the default Type would be handy in the future.-Eric
The text was updated successfully, but these errors were encountered: