JumpCloud SSO via SAML

Set up JumpCloud via SAML

Set up SSO for JumpCloud using SAML. For a general overview on SAML, see Setting up SAML2 Federated SSO.

NOTE
If you do not see SAML in the SSO list, please create a support ticket to enable SAML for your account.

Set up SAML SSO for JumpCloud by:

  1. Configuring SSO settings for JumpCloud via SAML in Codefresh
  2. Configuring SSO settings for Codefresh in JumpCloud
  3. Completing SSO configuration for JumpCloud in Codefresh

Step 1: Configure SSO settings for JumpCloud via SAML in Codefresh

  1. In the Codefresh UI, from the toolbar click the Settings icon.
  2. In the sidebar, from Access & Collaboration, select Single Sign-On.
  3. Click Add single-sign-on, select SAML, and then click Next.
  4. Enter the connection details:
    • Display Name: Any arbitrary name for this integration.
    • IDP Entry: Type in any character for now. You will enter the correct value from JumpCloud in the final step.
    • Application Certificate: You will enter the correct value from JumpCloud in the final step.
    • Provider: Leave empty.
  5. Click Add. The SAML integration for JumpCloud is added and appears in the list of SSOs.
  6. In the Single Sign-On page, click the Edit icon for the JumpCloud SAML integration you created.
  7. Copy the Assertion URL (client ID) that was automatically generated when you added the integration.
  8. Continue with Step 2: Configure SSO settings for Codefresh in JumpCloud.

Step 2: Configure SSO settings for Codefresh in JumpCloud

  1. In JumpCloud, go to User Authentication > SSO.
  2. To configure Codefresh as a new application, click +.
  3. Select Custom SAML.
  4. Add a Display Label for the application you will create.
  5. Click the SSO tab, and enter the following:
    1. IDP Entity ID: Enter the user-defined or generated Client Name from Codefresh. For example, gujNGnhXTSmK.

      TIP
      Make sure there no spaces before the name when copying and pasting.

    2. SP Entity ID: g.codefresh.io.
    3. ACS URL: Enter the Assertion URL (Callback URL) generated in Codefresh.
    4. Login URL: Enter the Assertion URL without the /callback.
    5. IDP URL: Add a custom name or leave the default. You will need the value to complete the SSO configuration in Codefresh.
    6. Attributes: Add the following:
      • email: email
      • firstName: firstname
      • lastName: lastname
    7. Click Activate and Continue.
  6. When you get a notification on the top right to download the Certificate, download the Certificate.
  7. Continue with Step 3: Complete SSO configuration for JumpCloud in Codefresh.

Step 3: Complete SSO configuration for JumpCloud in Codefresh

As the final step in configuring SSO for JumpCloud, add the IDP Entry and Certificate values from JumpCloud.

  1. IDP Entry: The IDP URL from the SSO tab in Jump Cloud.
  2. Application Certificate: Copy and paste the content between the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines, from the certificate you downloaded into the field.

    NOTE
    You will get a warning when editing the Certificate section.

  3. Click Save.

You have completed SSO integration for JumpCloud via SAML in Codefresh.

Test SSO Connection

Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.

  1. In the Codefresh UI, on the toolbar, click the Settings icon and then select Account Settings.
  2. From the sidebar, below Access & Collaboration, select Users & Teams.
  3. Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
  4. In a different browser or private/incognito browser window use the Corporate option to log in.

Federated Single Sign-On (SSO) overview
Setting up SAML2 Federated SSO
Common configuration for SSO providers