JumpCloud SSO via SAML
Set up JumpCloud via SAML
Set up SSO for JumpCloud using SAML. For a general overview on SAML, see Setting up SAML2 Federated SSO.
NOTE
If you do not see SAML in the SSO list, please create a support ticket to enable SAML for your account.
Set up SAML SSO for JumpCloud by:
- Configuring SSO settings for JumpCloud via SAML in Codefresh
- Configuring SSO settings for Codefresh in JumpCloud
- Completing SSO configuration for JumpCloud in Codefresh
Step 1: Configure SSO settings for JumpCloud via SAML in Codefresh
- In the Codefresh UI, from the toolbar click the Settings icon.
- In the sidebar, from Access & Collaboration, select Single Sign-On.
- Click Add single-sign-on, select SAML, and then click Next.
- Enter the connection details:
- Display Name: Any arbitrary name for this integration.
- IDP Entry: Type in any character for now. You will enter the correct value from JumpCloud in the final step.
- Application Certificate: You will enter the correct value from JumpCloud in the final step.
- Provider: Leave empty.
- Click Add. The SAML integration for JumpCloud is added and appears in the list of SSOs.
- In the Single Sign-On page, click the Edit icon for the JumpCloud SAML integration you created.
- Copy the Assertion URL (client ID) that was automatically generated when you added the integration.
- Continue with Step 2: Configure SSO settings for Codefresh in JumpCloud.
Step 2: Configure SSO settings for Codefresh in JumpCloud
- In JumpCloud, go to User Authentication > SSO.
- To configure Codefresh as a new application, click +.
- Select Custom SAML.
- Add a Display Label for the application you will create.
- Click the SSO tab, and enter the following:
- IDP Entity ID: Enter the user-defined or generated Client Name from Codefresh. For example,
gujNGnhXTSmK
.TIP
Make sure there no spaces before the name when copying and pasting. - SP Entity ID:
g.codefresh.io
. - ACS URL: Enter the Assertion URL (Callback URL) generated in Codefresh.
- Login URL: Enter the Assertion URL without the
/callback
. - IDP URL: Add a custom name or leave the default. You will need the value to complete the SSO configuration in Codefresh.
- Attributes: Add the following:
- email: email
- firstName: firstname
- lastName: lastname
- Click Activate and Continue.
- IDP Entity ID: Enter the user-defined or generated Client Name from Codefresh. For example,
- When you get a notification on the top right to download the Certificate, download the Certificate.
- Continue with Step 3: Complete SSO configuration for JumpCloud in Codefresh.
Step 3: Complete SSO configuration for JumpCloud in Codefresh
As the final step in configuring SSO for JumpCloud, add the IDP Entry and Certificate values from JumpCloud.
- IDP Entry: The IDP URL from the SSO tab in Jump Cloud.
- Application Certificate: Copy and paste the content between the
-----BEGIN CERTIFICATE-----
and-----END CERTIFICATE-----
lines, from the certificate you downloaded into the field.NOTE
You will get a warning when editing the Certificate section. - Click Save.
You have completed SSO integration for JumpCloud via SAML in Codefresh.
Test SSO Connection
Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.
- In the Codefresh UI, on the toolbar, click the Settings icon and then select Account Settings.
- From the sidebar, below Access & Collaboration, select Users & Teams.
- Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
- In a different browser or private/incognito browser window use the Corporate option to log in.
Related articles
Federated Single Sign-On (SSO) overview
Setting up SAML2 Federated SSO
Common configuration for SSO providers