About JumpCloud SAML Integration
JumpCloud SAML integration in Iru Endpoint lets you set up SAML-based SSO integration with JumpCloud for users accessing Iru Endpoint through their JumpCloud credentials.How It Works
When users attempt to access Iru Endpoint, they’re redirected to JumpCloud for authentication. After successful authentication, JumpCloud sends a SAML assertion back to Iru Endpoint, which validates the user’s identity and grants access to the platform.Setting Up the SAML Connection
Navigate to the Account Menu Button
Access Authentication Settings
Add New Connection
Add Authentication Method
Create Connection
Configuration Information
Copy Service Provider Entity ID
Copy ACS URL
Keep Tab Open
Configuring JumpCloud Application
Access JumpCloud Console
Create New Application
Select Custom Application
Configure SSO Options
- Manage Single Sign-On (SSO)
- Configure SSO with SAML
Continue Setup
Configure General Information
- Add a name for the Display Label.
- Add a Description if desired.
- Choose either a color Indicator or upload a logo for the Display Portal Image.
- Optionally, choose to show the application in the User Portal.
- Expand the disclosure triangle beside Advanced Settings.
- In the SSO IdP URL field, enter iru. The full URL should read https://sso.jumpcloud.com/saml2/iru.
- Click Save Application.
Configure Application
Configure SSO Settings
- Copy the Entity ID from Iru Endpoint that you saved earlier and paste it into the SP Entity ID field in JumpCloud only (do not paste it into the IdP Entity ID field).
- For the IdP Entity ID, create a unique Entity ID (e.g.
iru-saml-jumpcloud) and enter it in the IdP Entity ID field. Save this unique IdP Entity ID for use in Iru Endpoint later. - Copy the Assertion Consumer Service URL from Iru Endpoint that you saved earlier and paste it into the ACS URL field.
- Leave the SAML Subject NameID set to email.
- In the SAMLSubject NameID-Format field, select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress from the dropdown menu.
- Set the Signature Algorithm to RSA-SHA256.
- Select Sign Assertion.
- Ensure the IDP URL is https://sso.jumpcloud.com/saml2/iru. If it is not, you will need to delete the integration and create a new one. Copy this URL and save it for use in Iru Endpoint later.
- Click Save.
Download Certificate
Configure User Groups
- Add a user group to the SSO application. If you want to restrict who can access the SSO app, create another user group in your JumpCloud console and assign it to the SSO app.
Configuring Iru Endpoint SAML Connection
Return to Iru Endpoint
Name the Connection
Add Sign-in URL
Add IdP Entity ID
Upload Certificate
Configure User Attributes
Enable Sign Request
Set Request Algorithm
Set Digest Algorithm
Set Protocol Binding
Save Configuration
Allow for Tenant Authentication
Once you have configured the SAML connection in Iru Endpoint and your identity provider, you can allow its use for tenant authentication. For step-by-step instructions, please refer to the Allowing Tenant Authentication and Managing Connections section in our Single Sign-on support article.Enforcing Single Sign-On
Once you have configured at least one Single Sign-on connection, you can disable Passkey, Google Social, and Microsoft Social connections. Disabling these connections will disable the ability for Iru Endpoint administrators in your tenant to authenticate via those methods. Please refer to our Single Sign-on support article for step-by-step instructions.Testing the Integration
Add User to Admin Team
Fill User Information
Submit User
Close Invite Window
Refresh Access Page
Test SSO Login