JumpCloud SSO identity provider SAML Setup Instructions

  • Updated

Log in to your admin console at https://console.jumpcloud.com/login/admin.

From the left-hand navigation menu, click SSO Applications.

Click the + Add New Application button.

Select Custom Application and click Next.

Screenshot 2024-04-03 at 9.18.07 AM.png

Choose SSO with SAML as the integration method, then click Next.

Screenshot 2024-04-03 at 9.18.19 AM.png

When prompted to "Select the features you would like to enable," select Manage Single Sign-On (SSO) and then click Configure SSO with SAML.

Screenshot 2024-04-03 at 9.18.30 AM.png

Click Next and then click Configure Applications.

Screenshot 2024-04-03 at 9.18.56 AM.png

On the configuration screen, enter the following details:

IDP URL (default): https://sso.jumpcloud.com/saml2/[YOUR JUMPCLOUD CONFIGURATION NAME HERE]

Attributes/User Attributes:

Service Provider Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

JumpCloud Attribute Name: email

Service Provider Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

JumpCloud Attribute Name: email

Screenshot 2024-04-03 at 9.47.57 AM.png

Scroll down and configure the following:

  • IDP Entity ID: Set to your Osano Customer ID
  • SP Entity ID: urn:amazon:cognito:sp:us-east-1_7GtagkRKw
  • ACS URL (default): https://auth.osano.com/saml2/idpresponse

Screenshot 2024-04-03 at 10.16.56 AM.png

Ensure the Declare Redirect Endpoint switch is turned on.

Declare Redirect Endpoint Switch

Click Export Metadata and send the exported SSO metadata XML to Osano to complete the configuration of the https://my.osano.com web application client.

If JumpCloud is set up to authenticate multiple domains (e.g., abc.com and xyz.com), include those domain names in your communication to Osano to ensure continued access for all users.

Related to