Purpose
This document provides step-by-step instructions for integrating JumpCloud SSO (SAML 2.0) with your custom application.
Prerequisites
Before you begin, ensure the following:
- Admin access to the JumpCloud Admin Console
- A custom application that supports SAML 2.0 authentication
- A valid SSL certificate on your application
- Access to modify the SAML configuration in your application
Steps Involved
Step 1: Create a New SSO Application in JumpCloud
- Log in to your JumpCloud Admin Console and navigate to SSO → Applications.
- Click on Add New Application.
- Search SAML and select the SAML2.0 App.
- Provide a name for your application (e.g., OvalEdge).
- Upload a logo (optional).
- After submission, you'll be redirected to the SSO → Identity Management → User Group page.
Step 2: Configure SAML Settings
- Provide the required SAML configuration values:
- SP Entity ID
- ACS URL(s)
- IdP URL
- Select SSO and enter the required details as shown below.
Step 3: Configure Attribute Mapping
- Navigate to the User Attributes section in JumpCloud.
- Map the following attributes as needed:
- email →email
- firstName → firstname
- lastName → lastname
- (Optional) group → user.groups
- Click Save.
Step 4: Assign Users to the Application
User Creation Process
- Provide the required user details and click Save.
- Navigate to the User Group section to assign the user to the appropriate group.
- Provide necessary details and click Save.
Group Configuration
- Go to User Groups.
- Click the (+) icon, then provide the OvalEdge defined role in the Group configuration.
- Then, go to the users and add a previously created user to this group.
- Go to the application and add the above-created application as per the screenshot.
- Click Save Group & Apply Changes.
Step 5: Configure SAML in Your Custom Application
- Until the above configuration is done, then copy the METADATA URL as per the below navigated screenshot.
- Go to oasis.properties and update the below configurations with the URLs configured above.
- Once the above configuration is updated, add the parameter in setenv file as below. mentioned parameter -DOVALEDGE_SECURITY_TYPE=ldap
- Once it is done, then restart the service and check the logs.
Step 6: Test the SSO Integration
- Open a new incognito/private browser window.
- Navigate to your custom application's login page.
- Click Login with SSO.
- Enter your JumpCloud credentials.
Step 7: Troubleshooting Common Issues
- Incorrect Credentials / Access Denied
- Ensure the user is assigned to the application in JumpCloud.
- Verify attribute mapping matches the required fields.
- Signature Validation Failed
- Ensure the correct IdP Certificate is uploaded in your application.
- Check that the SP Entity ID matches what is configured in JumpCloud.
- Redirect Loop / Infinite Login Attempts
- Verify the ACS URL is correct.
- Ensure the application correctly handles SAML authentication responses.
Conclusion
This process helps users integrate JumpCloud SSO with their custom application using SAML 2.0. They can now securely log in using their JumpCloud credentials.
Copyright © 2025, OvalEdge LLC, Peachtree Corners, GA USA