Skip to main content
Use Jamf Pro actions in workflows to automate Apple device management, remote lock operations, and FileVault recovery key retrieval.

Actions

Retrieves all computers associated with a user from Jamf Pro, returning basic device information for each computer. Use this to identify user devices before performing other Jamf operations.Common use cases:
  • List all computers assigned to a user
  • Verify device ownership before granting access
  • Identify which computer to target for Jamf operations
  • Gather device inventory for a user
Locks Apple devices remotely through Jamf Pro MDM to secure lost, stolen, or compromised devices. Generates a 6-digit unlock PIN for each locked device that can be shared with the user.Input fields:
  • computers - Array of computers to lock (from Get User Computers action)
Output data:
  • computers - Array of locked computers with their unlock PINs
Common use cases:
  • Lock lost or stolen Mac devices immediately
  • Secure compromised devices during security incidents
  • Enforce device security policies for non-compliant devices
  • Remotely secure devices during employee offboarding
Retrieves the FileVault recovery key for Mac computers that have escrowed their encryption keys with Jamf Pro. Use this to help users recover access to encrypted Mac devices.Input fields:
  • computers - Array of computers to retrieve FileVault keys for (from Get User Computers action)
Output data:
  • computers - Array of computers with:
    • FileVault recovery key
    • Boot partition encryption details (partition name, FileVault state, encryption percentage)
    • Recovery key validity status
    • Institutional recovery key presence
    • Disk encryption configuration name
Common use cases:
  • Help users recover access to encrypted Mac devices
  • Retrieve escrowed FileVault keys for device recovery
  • Verify FileVault encryption status on devices
  • Support disk recovery scenarios when users forget their password