Scrapes the Jamf console for activation lock bypass codes. Single devices can be pulled used the arguments -name (computer name), -id (device id). Multiple devices can be pulled using -csv (serial numbers).
This contains two different scripts:
Scrapes the Jamf console for macOS device lock passcodes for all computers in your instance and outputs the serial number and lock code for devices that have received the lock command.
Scrapes the Jamf console for macOS device lock passcodes based on a provided CSV using the -csv argument. The csv is required to have a column of serial numbers, with the header 'Serial Number'. The intent was to make this easy to use a CSV exported from the Jamf console.
Gets serial numbers assigned to a PreStage Enrollment using the PreStage Enrollment id.
Gets recovery lock passwords for devices by csv (serial numbers).
Sends MDM OS update command to devices by csv (serial numbers). Unable to get major OS updates to work, API request body needs to by modified.
Lifted heavily from https://github.com/shbedev/jamf-recovery-lock, which should be used instead. I used this line to point the script to a specific smart group in Jamf that targeted the devices we wanted.
Sends a Jamf binary self-heal to devices by csv (serial numbers).