Enrolling macOS Devices with KyberGate Agent
Deploy KyberGate on macOS devices using the KyberGate Agent app. Available on the Mac App Store, the agent provides system-wide web filtering, automatic proxy configuration, and certificate management for macOS laptops and desktops.
Before You Begin
- macOS 13 (Ventura) or later
- Administrator access on the Mac
- Your organization's enrollment token (found in Settings → Devices → Add Device → macOS in your dashboard)
- For MDM deployment: Jamf Pro, Mosyle, Kandji, or another macOS MDM
Installation Methods
Method 1: Mac App Store (Individual Devices)
- Open the App Store on the Mac
- Search for KyberGateAgent
- Click Get → Install
- Open KyberGateAgent from Applications or Launchpad
- Enter your enrollment token when prompted
- Grant the requested permissions:
- Network Extension: Required for proxy configuration
- System Proxy: Required to route traffic through KyberGate
- Enter your Mac admin password to authorize system changes
- The agent connects and the device appears in your dashboard
Method 2: MDM Deployment (Fleet)
Jamf Pro:
- In Jamf, go to Computers → Configuration Profiles → New
- Add a Global HTTP Proxy payload with PAC URL from your dashboard
- Add a Certificate payload with the KyberGate root certificate
- Deploy KyberGateAgent via App Store Apps in Jamf
- Pass enrollment token via managed app configuration key
enrollmentToken
Mosyle:
- In Mosyle, go to Management → Install Apps
- Add KyberGateAgent from the App Store
- Create a proxy profile with your PAC URL under Network
- Deploy certificate profile and push to your macOS device group
Kandji:
- Add a Custom App library item for KyberGateAgent
- Create a Network profile with PAC file URL
- Add a Certificate profile with the KyberGate root certificate
- Assign to your Mac blueprint
Method 3: MDM Auto-Enrollment
If deployed via MDM with managed app configuration, it can auto-enroll without user interaction:
- Set the
enrollmentTokenkey in the MDM's managed app configuration - The agent reads the token on first launch and enrolls automatically
- No manual token entry required — ideal for zero-touch deployment
What the Agent Does
- Configures system proxy settings using your organization's PAC file
- Installs and trusts the KyberGate root certificate in the System Keychain
- Monitors web traffic and reports activity to your dashboard
- Runs as a Launch Agent (starts on login)
- Supports network extension for advanced traffic inspection
Verifying Installation
- Check the menu bar — the KyberGate icon should appear with a green dot
- Click the icon → Status to see connection info and last check-in time
- The device should appear in your dashboard under Devices within 2-5 minutes
- Visit a blocked site to confirm filtering is working
Tips
- For large deployments, use MDM auto-enrollment — it's zero-touch
- The agent persists across macOS updates
- System Extension approval may require MDM pre-approval for silent installation
Troubleshooting
- Network Extension permission denied: Go to System Settings → Privacy & Security → Network Extensions and enable KyberGateAgent
- Certificate not trusted: Open Keychain Access → System → Certificates, find the KyberGate certificate, set trust to Always Trust
- Agent not starting: Check System Settings → Login Items to ensure KyberGateAgent is listed
- MDM profile conflicts: Ensure only one proxy configuration is active