You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/jumpcloud-saml.mdx
+49-2Lines changed: 49 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,12 @@ pcx_content_type: how-to
3
3
title: JumpCloud (SAML)
4
4
---
5
5
6
+
import { Render } from"~/components";
7
+
6
8
[JumpCloud](https://jumpcloud.com/#platform) provides SSO identity management. Cloudflare Access integrates with JumpCloud as a SAML identity provider.
7
9
10
+
The following steps are specific to setting up JumpCloud with Cloudflare Access. For more information on configuring JumpCloud SSO application, refer to the [JumpCloud documentation](https://jumpcloud.com/support/integrate-with-cloudflare).
11
+
8
12
## Set up Jumpcloud as a SAML provider
9
13
10
14
1. In the [JumpCloud Admin Portal](https://console.jumpcloud.com/#/home), go to **SSO Applications**.
3. Scroll up to **JumpCloud Metadata** and select **Export Metadata**. Save this XML file for use in a later step.
41
+
3. (Optional) Configure SAML attributes that you want to send to Cloudflare Access.
42
+
43
+
4. Scroll up to **JumpCloud Metadata** and select **Export Metadata**. Save this XML file for use in a later step.
38
44
39
45
9. In the **User Groups** tab, [assign user groups](https://jumpcloud.com/support/get-started-applications-saml-sso#managing-employee-access-to-applications) to this application.
You can now [test your connection](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) and create [Access policies](/cloudflare-one/policies/access/) based on the configured login method and SAML attributes.
54
62
63
+
## Synchronize users and groups
64
+
65
+
The JumpCloud integration allows you to synchronize user groups and automatically deprovision users using [SCIM](/cloudflare-one/identity/users/scim/).
66
+
67
+
### 1. Enable SCIM in Zero Trust
68
+
69
+
<Render
70
+
file="access/enable-scim-on-dashboard"
71
+
params={{ idp: "JumpCloud"}}
72
+
/>
73
+
74
+
### 2. Configure SCIM in JumpCloud
75
+
76
+
1. In the [JumpCloud Admin Portal](https://console.jumpcloud.com/#/home), go to **SSO Applications**.
77
+
2. Select the Cloudflare application that was created when you [Set up JumpCloud as a SAML provider](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#set-up-jumpcloud-as-a-saml-provider).
78
+
3. Select the **Identity Management** tab.
79
+
4. Make sure that **Enable management of User Groups and Group Membership in this application** is turned on.
80
+
5. Select **Configure**.
81
+
6. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
82
+
7. In the **Token Key** field, enter the **SCIM Secret** obtained from Zero Trust.
83
+
8. Select **Activate**. You will receive a confirmation that the Identity Management integration has been successfully verified.
84
+
9. Select **Save**.
85
+
86
+
<Renderfile="access/verify-scim-provisioning"/>
87
+
88
+
### Provisioning attributes
89
+
90
+
Provisioning attributes define the user and group properties that JumpCloud will synchronize with Cloudflare Access. By default, JumpCloud will send the following attributes during a SCIM update event:
91
+
92
+
| JumpCloud user attribute| Cloudflare Access attribute |
93
+
| ------------------ | ----------------------- |
94
+
|`email`|`email`|
95
+
|`firstname`|`givenName`|
96
+
|`lastname`|`surname`|
97
+
98
+
| JumpCloud group attribute | Cloudflare Access attribute |
0 commit comments