Cato Networks Knowledge Base

Upgrading macOS Clients with an MDM

This article discusses how to configure a Mobile Device Management (MDM) to update macOS Clients for SDP users in your account.

This feature is supported for macOS Client v5.0 and higher.

Overview of Updating macOS Clients with an MDM

Starting with macOS Client v5.0, you can configure the Cato Management Application to use an MDM to manage the updates for macOS Clients in your organization. All Client updates are controlled using the MDM and endusers don't receive notifications of new Client versions.

When you configure the Client Upgrade Policy for your account, the same policy is applied to Windows and macOS upgrades. For more about the Upgrade Policy, see Configuring the Client Upgrade Policy.

High Level Workflow of Managed Upgrade for macOS Clients

This is an overview of the workflow to implement an MDM solution for macOS Clients in your account.

  1. In the Cato Management Application, set the Upgrade Policy to Managed Upgrade.

    • New Cato Management Application, from the navigation menu select Access > Client Access > Upgrade Policy.

    • Legacy Cato Management Application, from the navigation menu select Configuration > Global Settings > VPN Settings > Upgrade Policy.

  2. Import the macOS package.

  3. Configure the MDM to create a policy that allows the DMG extension and VPN profiles for endusers.

    Otherwise, endusers need to manually approve and allow the above items in the macOS.

  4. In the MDM, distribute the new macOS Client version to the endusers in your account.

Importing the macOS Package

To use the Managed Upgrade for the macOS Client in your account, first you need to import the package to the MDM.

Sample JAMF Procedure to Import the macOS Package

  1. From the navigation menu, select Settings > Computer Management.

  2. Select Packages and click New.

  3. Enter the Display Name.

  4. Click Choose File and select the macOS Client package.

  5. Click Save.

    The macOS Client package is imported to JAMF.

Automatically Allowing macOS Permissions for the Client with the MDM

Starting with the macOS Client v5.0, the following permissions are required to install the Client on a macOS host:

  • Allow the Cato Client to create a VPN profile

  • Allow system extensions for the Cato Client

You can configure the MDM to automatically allow these permissions for enduser as part of the installation process for the new Client version. Otherwise, the enduser must manually configure the macOS settings as part of the installation process.

Allowing Permissions for the VPN Profile

In the MDM, create a VPN Payload that contains the settings to automatically set the macOS to allow permissions for the Cato Client VPN profile. When the Client is installed, the VPN Profile permissions are set correctly and the macOS doesn't request the enduser to manually configure them.



Connection Name

Cato Networks VPN

Connection Type

Custom SSL (from the drop-down menu)






Provider Bundle Identifier


User Authentication

  1. Choose the Password option.

  2. Clear the Send all traffic through VPN option.

Provider Type

Packet Tunnel

Provider Designated Requirement

anchor apple generic and identifier "com.catonetworks.mac.CatoClient" and (certificate leaf[field.1.2.840.113635.] /* exists */ or certificate 1[field.1.2.840.113635.] /* exists */ and certificate leaf[field.1.2.840.113635.] /* exists */ and certificate leaf[subject.OU] = CKGSB8CH43)

Sample JAMF Procedure to Set Permissions for the VPN Settings

Create the new profile and then configure the VPN settings for that profile.

  1. Create the profile for the macOS Client:

    1. From the navigation pane, select Computers > Configuration Profiles.

    2. Click New and create a new profile for the Cato Client.

  2. Edit the VPN settings to allow the VPN permissions for the profile (based on the data in the table above):

    1. In Configuration Profiles, edit the profile you created in the previous step and select VPN.

    2. Enter the settings for the VPN Type, Connection Type, Identifier, Server, Account, and Provider Bundle Identifier.

    3. Configure the settings for the User Authentication, Provider Type, and Provider Designated Requirement.



Allowing System Extensions

In the MDM, configure the policy to allow the system extensions that are used by the macOS Client. When the Client is installed, the system extension permissions are set correctly and the macOS doesn't request the enduser to manually configure them.



Display Name

CatoClient System Extension

System Extension Types

Allowed System Extensions

Team Identifier


Allowed System Extensions

  • com.catonetworks.mac.CatoClient

  • com.catonetworks.mac.CatoClient.CatoClientSysExtension


Sample JAMF Procedure to Set Permissions for the System Extensions

Edit the System Extensions settings to allow the system permissions for the profile (based on the data in the table above).

  1. Select Allow users to approve system extensions.

  2. Enter the Display Name.

  3. Select the System Extension Types.

  4. Enter the Team Identifier.

  5. Make sure that the values for the Approved System Extensions are correct.

  6. Save the changes to the macOS Client profile.

Distributing the macOS Client

In the MDM, select the users and groups that are receiving the Cato VPN profile. Then create a new policy with the macOS package and push the policy to the users.

Sample JAMF Procedure to Distribute the macOS Client

  1. In Computers > Configuration Profiles, select the group or specific users that are receiving the Cato VPN profile.

  2. Create a new policy and add the macOS package to it.

    1. In Computers > Policy, create a new policy.

    2. From the General section, configure these settings:

      1. Enter the Display Name.

      2. Configure the other policy settings based on the requirements for your organization.

    3. In the Packages section, add the macOS Client package.

  3. Click Save. The profile is ready to distribute the Client to the macOS devices.

Known Limitations

  • There is a known issue related to MDM and macOS, where pop-up windows sometimes are shown even though the permissions were set correctly in the MDM.

    • Workaround - First distribute the permissions for DMG extension and the VPN payload. Then distribute the Clients to the macOS hosts.

Was this article helpful?

2 out of 2 found this helpful



  • Comment author
    Yaakov Simon

    Updated article and added examples for configuring JAMF to distribute the macOS Client

  • Comment author
    Orlando Rodriguez

    The Team ID shows as Ch33 but the Kernel screenshot shows CH43. Which one is it?

  • Comment author
    ed tan

    Team ID  on the documentations says CKGSB8Ch33, but screenshot says CKGSB8ch34.

  • Comment author
    Yaakov Simon
    • Edited

    Orlando and Ed,

    Sorry for the confusion! Indeed CH43 is correct, and I updated the article to show the Team ID as CKGSB8CH43


  • Comment author
    Peter Schwarz

    Are there plans to support other MDMs in the future?

  • Comment author
    Yaakov Simon


    Many MDMs are supported for the macOS Client. This article includes examples for JAMF.

    If you have a question about a specific vendor, please contact Support.



  • Comment author
    Christopher Moynier

    Can we get an example with Microsoft Intune?

  • Comment author
    David Panodishvili

    Hi, Do we need to adjust the JamF policy for computers with an Apple processor and a MacOS Monterey operating system?
    Because the new operating systems are not supporting "Approved Kernel Extensions ".

  • Comment author
    Community Manager The chief of community conversations. Community manager

    Hello David!

    My apologies that your comment has gone unnoticed for so long!  I believe you are correct.  I will ask the author of the document to update it appropriately.

    Kind Regards,

    Dermot Doran

  • Comment author
    Community Manager The chief of community conversations. Community manager
    • Edited

    Hello David!

    The article has been updated to reflect the changes to macOS that resulted in "Approved Kernel Extensions" going out of support.  Thank you again from bringing this to our attention.

    Kind Regards,

    Dermot Doran


Please sign in to leave a comment.