Skip to main content
Applies to BloodHound Enterprise and CE

Metadata

Name: JamfHound
Display Name: JAMF (JamfHound)
Version: 1.1.0
Namespace: jamf
Environment Kind: jamf_Tenant
Source Kind: jamf_Base
This file is automatically generated from the schema_enterprise.json file that is bundled with JAMF (JamfHound).

Nodes

IconNode KindDisplay Name
jamf_Accountjamf_AccountJAMF Account
jamf_ApiClientjamf_ApiClientJAMF API Client
jamf_Computerjamf_ComputerJAMF Computer
jamf_ComputerUserjamf_ComputerUserJAMF Computer User
jamf_DisabledAccountjamf_DisabledAccountJAMF Disabled Account
jamf_DisabledApiClientjamf_DisabledApiClientJAMF Disabled API Client
jamf_Groupjamf_GroupJAMF Group
jamf_Sitejamf_SiteJAMF Site
jamf_SSOIntegrationjamf_SSOIntegrationJAMF SSO Integration
jamf_Tenantjamf_TenantJAMF Tenant

Edges

Relationship KindTraversableDescription
jamf_AdminToRepresents full administrative control over the target and all resources controlled by the target.
jamf_AdminToSiteThe source has administrative control over the site and all resources controlled by the site. This includes creating policies that impact resources of the site, send or clear MDM commands, remotely administer site devices and computers, create computer objects for the site.
jamf_AssignedUserRepresents the user assignment relationship on a JAMF-managed computer.
jamf_AZMatchedEmailRepresents a cross-platform identity correlation where the JAMF principal’s email attribute matches an Azure AD account’s email.
jamf_ContainsRepresents a structural containment relationship where the source node contains the target resource.
jamf_Create_API_Client_and_Assign_RoleRepresents a privilege escalation path where the source possesses ‘Create API Integrations’ permission and at least one role exists allowing the creation of new API clients to assume existing role permissions.
jamf_Create_API_Client_and_Create_RoleRepresents a combined privilege escalation path, where the source possesses the ‘Create API Integrations’ and ‘Create API Roles’ permissions, that allow the creation of new API clients with any permissions in newly assigned roles and retrieving API client credentials to authenticate.
jamf_Create_API_Client_and_Update_RoleRepresents a combined privilege escalation path where the source possesses ‘Create API Integrations’ and ‘Update API Roles’ permissions and at least one API role exists allowing the creation of new API clients to assume roles, modifying the permissions of existing roles, and retrieving API client credentials.
jamf_CreateAccountsRepresents possession of the ‘Create Accounts’ JSS Object permission which allows creating new accounts, including administrators, as well as creating new groups with any permissions.
jamf_CreateAPIRolesRepresents the ability to create API roles in the JAMF tenant. Non-traversable because creating roles without the ability to create or update API integrations does not provide a credential retrieval mechanism.
jamf_CreateComputerExtensionsRepresents the ability to create computer extension attributes which can execute code on all computers in the JAMF tenant.
jamf_CreatePoliciesRepresents possession of the ‘Create Policies’ JSSObject privilege allowing code execution on target computers.
jamf_MatchedEmailRepresents an identity correlation where the JAMF computer user’s email attribute matches the JAMF account’s email.
jamf_MatchedNameRepresents an identity correlation where the JAMF computer user’s displayname matches the JAMF account’s name or displayname.
jamf_MemberOfRepresents group membership where the source inherits the group’s permissions and assignments.
jamf_Okta_Same_DeviceRepresents a hybrid cross-platform device correlation where the JAMF Pro registered computer’s UDID matches the registered device UDID in Okta.
jamf_ScriptsNonTraversableRepresents the ability to create or update scripts on the target. This edge is non-traversable because script creation/modification alone does not enable code execution.
jamf_SSO_LoginRepresents the ability of an SSO identity provider to authenticate as and inherit the privileges of JAMF accounts and groups.
jamf_Update_API_Client_and_Assign_RoleRepresents posession of the ‘Update API Integrations’ permission and at least one role has been created in the tenant. Combined these allow updating existing API clients to assume the permissions of existing roles. Non-traversable because these permissions alone cannot retrieve API client credentials.
jamf_Update_API_Client_and_Create_RolesRepresents combined possession of ‘Update API Integrations’ and ‘Create API Roles’ permissions and at least one API client exists in the tenant allowing updates of existing API clients and assigning new roles created with any included permissions. Non-traversable because these permissions alone cannot retrieve API client credentials.
jamf_Update_API_Client_and_Update_RolesRepresents combined possession of ‘Update API Integrations’ and ‘Update API Roles’ permissions and at least one Api Client and Role exist in the tenant allowing updates of existing API clients with any permissions by updating existing roles. Non-traversable because these permissions alone cannot retrieve API client credentials.
jamf_Update_Recurring_ScriptsRepresents a code execution path where the source has ‘Update Scripts’ JSSObject permission and there are scripts configured to run repeatedly on target computers via enabled policies allowing code execution.
jamf_Update_Roles_Assigned_To_SelfRepresents an API client possessing the ‘Update API Roles’ permission which allows updating existing API roles with any permissions, including roles assigned to itself.
jamf_Update_Self_and_Assign_RolesRepresents an API client that possesses ‘Update API Integrations’ permission and at least one role exists, allowing the client to assume the permissions of existing roles.
jamf_Update_Self_and_Create_RolesRepresents an API client that possesses ‘Update API Integrations’ and ‘Create API Roles’ permissions, allowing the client to assign new roles with any included permissions.
jamf_Update_Self_and_Update_RolesRepresents an API client that possesses ‘Update API Integrations’ and ‘Update API Roles’ permissions and at least one role exists, allowing the client to assign any permissions by modifying existing roles.
jamf_Update_SSO_SettingsRepresents the ability to update or enable SSO settings in the tenant to change authentication to inherit the privileges of JAMF accounts and groups.
jamf_UpdateAccountsRepresents possession of the ‘Update Accounts’ JSS Object permission which allows altering the passwords, enabled status, permissions, and memberships of existing accounts or groups.
jamf_UpdateAPIRolesRepresents the ability to update existing API roles in the JAMF tenant. Non-traversable because modifying roles without the ability to create or update API clients does not provide a credential retrieval mechanism.
jamf_UpdateComputerExtensionsRepresents the ability to update existing computer extension attributes and at least one extension attribute exists, allowing execution of code on all computers in the JAMF tenant during inventory collection.
jamf_UpdatePoliciesRepresents possession of the ‘Update Policies’ JSSObject privilege and at least one policy already exists in the tenant, allowing modification of existing policies for code execution on target computers.