Skip to main content

About JumpCloud SAML Integration

JumpCloud SAML integration in Iru Endpoint lets you set up SAML-based SSO integration with JumpCloud for users accessing Iru Endpoint through their JumpCloud credentials.

How It Works

When users attempt to access Iru Endpoint, they’re redirected to JumpCloud for authentication. After successful authentication, JumpCloud sends a SAML assertion back to Iru Endpoint, which validates the user’s identity and grants access. SSO can be used for Iru Endpoint Web App sign-in and for Require Authentication with Automated Device Enrollment.

Setting Up the SAML Connection

You’ll need to complete the initial setup in Iru Endpoint first to get the configuration information required for JumpCloud. After copying the Entity ID and ACS URL, switch to the JumpCloud Application Configuration tab to continue.
1

Navigate to the Account Menu Button

In Iru Endpoint, in the sidebar, click the Account Menu Button.
2

Access Authentication Settings

Click the Access option in the menu.
3

Select Admin and Authentication

Select the Admin and authentication tab (selected by default) and scroll down to Authentication methods.
4

Add Authentication Method

Click + Authentication method.
5

Enter Display Name

Enter a display name for the SSO Connection.
6

Select Authentication Method

Select SAML for the Authentication method.
7

Create Connection

Click Create.
8

Configuration Information

Click Configuration information if that section is not already expanded.
9

Copy Service Provider Entity ID

Copy the Service provider entity ID into a text document for later use. You’ll need this for the JumpCloud configuration.
10

Copy ACS URL

Copy the Assertion consumer service (ACS) URL into a text document for later use. You’ll need this for the JumpCloud configuration.
11

Keep Tab Open

Keep the Iru Endpoint configuration modal open, then switch to the JumpCloud Application Configuration tab to continue.

Configuring Iru Endpoint SAML Connection

After completing the JumpCloud Application Configuration, return here to finish setting up the SAML connection in Iru Endpoint. You’ll need the Sign-in URL, IdP Entity ID, and certificate from JumpCloud.
1

Return to Iru Endpoint

Go back to the Custom SAML modal in Iru Endpoint.
2

Configure IdP Attribute

Keep the IdP attribute setting as Subject.
3

Configure Attribute Name

Leave the Attribute name blank.
4

Configure User Attributes

Set User attribute to User Principal Name (UPN).
5

Add IdP Entity ID

Paste the unique IdP Entity ID you created earlier in JumpCloud into the IdP Entity ID field in Iru Endpoint.
6

Add Sign-in URL

Paste in the Sign-in URL you copied from JumpCloud: https://sso.jumpcloud.com/saml2/iru.
7

Upload Certificate

Upload the certificate you downloaded from JumpCloud.
8

Set Request Binding

Set the Request Binding to HTTP-POST.
9

Set Request Signature Algorithm

Ensure that Request Signature Algorithm is set to RSA-SHA256.
10

Set Request Digest Algorithm

Ensure that Request Digest Algorithm is set to SHA256.
11

Enable Request Signing

Ensure that Sign SAML Authentication Request is enabled.
12

Set Response Signature Verification

Set Response Signature Verification to Assertion.
13

Set Destination

Leave the optional Destination blank.
14

Set Allowed Signature Algorithm

Set Allowed Signature Algorithm to RSA-SHA256.
15

Set Allowed Digest Algorithm

Set Allowed Digest Algorithmn to SHA-256.
16

Save Configuration

Click Save.

Allow for Tenant Authentication

Once you have configured the SAML connection in Iru Endpoint and your identity provider, you can allow its use for tenant authentication. For step-by-step instructions, please refer to the Allowing Tenant Authentication and Managing Connections section in our Single Sign-on support article.

Limit Authentication to Domain

When configuring the SAML connection, you can optionally limit authentication to one or more domains. This can be useful when the SSO connection could authenticate to multiple domains. You can limit the authentication to your Iru tenant to a subset of the available domains.

Enforcing Single Sign-On

Once you have configured at least one Single Sign-on connection, you can disable Passkey, Google Social, and Microsoft Social connections. Disabling these connections will disable the ability for Iru Endpoint administrators in your tenant to authenticate via those methods. Please refer to our Single Sign-on support article for step-by-step instructions.

Testing the Integration

1

Add User to Admin Team

Add a user to the Admin Team in Iru Endpoint by clicking New User.
2

Fill User Information

Fill in all of the corresponding user information. This user must exist in JumpCloud and must be assigned to the Iru Endpoint SSO app in your JumpCloud tenant.
3

Submit User

Click Submit.
4

Close Invite Window

Once the invite is submitted, close the Invite User window.
5

Refresh Access Page

Refresh the Access page in Iru Endpoint. You should see the user you just added.
6

Test SSO Login

Check the user’s email to accept the invitation and log into Iru Endpoint with the new SAML SSO connection.

Considerations

Security: Ensure that your JumpCloud tenant has appropriate security policies configured for SAML authentication.User Management: Users must exist in both JumpCloud and Iru Endpoint to successfully authenticate via SSO.Testing: Always test the SSO integration with a small group of users before rolling out to your entire organization.Certificate Management: Keep track of certificate expiration dates and ensure timely renewal to maintain SSO functionality.