Log in to your admin console at https://console.jumpcloud.com/login/admin.
From the left-hand navigation menu, click SSO Applications.
Click the + Add New Application button.
Select Custom Application and click Next.
Choose SSO with SAML as the integration method, then click Next.
When prompted to "Select the features you would like to enable," select Manage Single Sign-On (SSO) and then click Configure SSO with SAML.
Click Next and then click Configure Applications.
On the configuration screen, enter the following details:
IDP URL (default): https://sso.jumpcloud.com/saml2/[YOUR JUMPCLOUD CONFIGURATION NAME HERE]
Attributes/User Attributes:
Service Provider Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
JumpCloud Attribute Name: email
Service Provider Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
JumpCloud Attribute Name: email
Scroll down and configure the following:
- IDP Entity ID: Set to your Osano Customer ID
-
SP Entity ID:
urn:amazon:cognito:sp:us-east-1_7GtagkRKw
-
ACS URL (default):
https://auth.osano.com/saml2/idpresponse
Ensure the Declare Redirect Endpoint switch is turned on.
Click Export Metadata and send the exported SSO metadata XML to Osano to complete the configuration of the https://my.osano.com
web application client.
If JumpCloud is set up to authenticate multiple domains (e.g., abc.com
and xyz.com
), include those domain names in your communication to Osano to ensure continued access for all users.
Related to