Skip to content

Commit b2540b2

Browse files
committed
jumpcloud scim
1 parent c99db07 commit b2540b2

File tree

1 file changed

+49
-2
lines changed

1 file changed

+49
-2
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/jumpcloud-saml.mdx

Lines changed: 49 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,12 @@ pcx_content_type: how-to
33
title: JumpCloud (SAML)
44
---
55

6+
import { Render } from "~/components";
7+
68
[JumpCloud](https://jumpcloud.com/#platform) provides SSO identity management. Cloudflare Access integrates with JumpCloud as a SAML identity provider.
79

10+
The following steps are specific to setting up JumpCloud with Cloudflare Access. For more information on configuring JumpCloud SSO application, refer to the [JumpCloud documentation](https://jumpcloud.com/support/integrate-with-cloudflare).
11+
812
## Set up Jumpcloud as a SAML provider
913

1014
1. In the [JumpCloud Admin Portal](https://console.jumpcloud.com/#/home), go to **SSO Applications**.
@@ -34,7 +38,9 @@ title: JumpCloud (SAML)
3438
```txt
3539
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
3640
```
37-
3. Scroll up to **JumpCloud Metadata** and select **Export Metadata**. Save this XML file for use in a later step.
41+
3. (Optional) Configure SAML attributes that you want to send to Cloudflare Access.
42+
43+
4. Scroll up to **JumpCloud Metadata** and select **Export Metadata**. Save this XML file for use in a later step.
3844

3945
9. In the **User Groups** tab, [assign user groups](https://jumpcloud.com/support/get-started-applications-saml-sso#managing-employee-access-to-applications) to this application.
4046

@@ -48,10 +54,51 @@ title: JumpCloud (SAML)
4854

4955
14. Upload your JumpCloud XML metadata file.
5056

51-
15. Select **Save**.
57+
15. (Optional) Configure [additional SAML options](/cloudflare-one/identity/idp-integration/generic-saml/#optional-configurations).
58+
59+
16. Select **Save**.
5260

5361
You can now [test your connection](/cloudflare-one/identity/idp-integration/#test-idps-in-zero-trust) and create [Access policies](/cloudflare-one/policies/access/) based on the configured login method and SAML attributes.
5462

63+
## Synchronize users and groups
64+
65+
The JumpCloud integration allows you to synchronize user groups and automatically deprovision users using [SCIM](/cloudflare-one/identity/users/scim/).
66+
67+
### 1. Enable SCIM in Zero Trust
68+
69+
<Render
70+
file="access/enable-scim-on-dashboard"
71+
params={{ idp: "JumpCloud"}}
72+
/>
73+
74+
### 2. Configure SCIM in JumpCloud
75+
76+
1. In the [JumpCloud Admin Portal](https://console.jumpcloud.com/#/home), go to **SSO Applications**.
77+
2. Select the Cloudflare application that was created when you [Set up JumpCloud as a SAML provider](/cloudflare-one/identity/idp-integration/jumpcloud-saml/#set-up-jumpcloud-as-a-saml-provider).
78+
3. Select the **Identity Management** tab.
79+
4. Make sure that **Enable management of User Groups and Group Membership in this application** is turned on.
80+
5. Select **Configure**.
81+
6. In the **Base URL** field, enter the **SCIM Endpoint** obtained from Zero Trust.
82+
7. In the **Token Key** field, enter the **SCIM Secret** obtained from Zero Trust.
83+
8. Select **Activate**. You will receive a confirmation that the Identity Management integration has been successfully verified.
84+
9. Select **Save**.
85+
86+
<Render file="access/verify-scim-provisioning"/>
87+
88+
### Provisioning attributes
89+
90+
Provisioning attributes define the user and group properties that JumpCloud will synchronize with Cloudflare Access. By default, JumpCloud will send the following attributes during a SCIM update event:
91+
92+
| JumpCloud user attribute| Cloudflare Access attribute |
93+
| ------------------ | ----------------------- |
94+
| `email` | `email` |
95+
| `firstname` | `givenName` |
96+
| `lastname` | `surname` |
97+
98+
| JumpCloud group attribute | Cloudflare Access attribute |
99+
| ------------------ | ----------------------- |
100+
| `name` | `groups` |
101+
55102
## Example API configuration
56103

57104
```json

0 commit comments

Comments
 (0)