Configuring JumpCloud as an Identity Provider

Updated 2 weeks ago by admin

  1. Navigate to Products -> IDaaS -> Identity Providers and click the + button.
  2. Select JumpCloud from the list of available providers:
  3. Click Download Metadata to download an XML file that can be used to automatically configure your Identity Provider:
  4. Click Next.
  5. Log in to the JumpCloud console and navigate to SSO and click + . In the bottom panel, click Custom SAML App
  6. Enter a Display Label e.g. IDaaS to identify this SSO connection
  7. Click the SSO tab and then Upload Metadata selecting the XML downloaded in Step 3. This will prepopulate a number of fields
  • For the IdP Identity ID you can enter in a unique identifier, such as sso.jumpcloud.com
  • For the SAMLSubject NameID select email
  • For the SAMLSubject NameID Format select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
  • For the IdP URL you can specify a path such as idaas e.g. https://sso.jumpcloud.com/saml2/idaas
  • Under User Attributes click Add and add the following

Service Provider Attribute Name

JumpCloud Attribute Name

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

email

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname

firstname

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname

lastname

http://schemas.microsoft.com/identity/claims/displayname

displayname

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

username

  1. Click the User Groups tab and tick the groups that should have access to this SSO connector e.g. All Groups
Make sure that you have users provisioned within JumpCloud to use for SSO with cloud apps
  1. Click Activate
  2. Now select the newly created connector, click the SSO tab and then Export Metadata
  3. Return to the Identity Provider wizard, click Next and upload the XML file downloaded in the previous step
  4. Click Next
  5. Continue to connect at least one app to verify the configuration is working as expected


How did we do?