# Single Sign-On with JumpCloud

## Step 1 - Obtain the SAML Provider Details from Updraft

> Only Owner of an Updraft Organization is able to add an SSO Integration

1. Open your Account Settings as an Owner
2. Go to the Security Page
3. Click Add new SSO
4. Click CUSTOM SSO
5. You will see now your SAML configuration
6. Store them

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FYreIsseqtl3EWH2lttJ6%2F_1.png?alt=media&#x26;token=ab0eec54-e92a-4353-822e-2c99432e220d" alt=""><figcaption></figcaption></figure>

## Step 2 - Add a New App in JumpCloud Identity Provider

1. Open the Admin Dashboard of JumpCloud: <https://console.jumpcloud.com/login/admin>&#x20;
2. Click on **SSO Application.**
3. Click on the circular **+** button, or, if this is your first application, click **Get Started**.

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FqdfndbrLgmSNYlmVyaiW%2F_2.png?alt=media&#x26;token=601bbe46-44fb-421f-a724-17bd702afe2b" alt=""><figcaption></figcaption></figure>

4. At the bottom of the screen, click **Select** in the Custom Application tile. Then, click **Next**.

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FSQL33tQIi0DjQwxpI9kT%2F_3.png?alt=media&#x26;token=bf5f91ce-99e7-41a4-a304-fd66e0e011f9" alt=""><figcaption></figcaption></figure>

5. On the **Select Options** tab, select the following.&#x20;
   * **Manage Single Sign-On (SSO)**
   * **Configure SSO with SAML**
6. Click **Next**.

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FoVaEuIDsp3Ltln81XFrW%2F_5.png?alt=media&#x26;token=60e071cd-9262-482e-9f70-d98a84265113" alt=""><figcaption></figcaption></figure>

7. On the **Enter** **General Info** tab:

   a. Add a name for the **Display Label**.

   b. Click **Save Application**.

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FssJcs9UZvPhSDLwSdg2g%2FA.png?alt=media&#x26;token=a5c18d43-63d8-4a3e-a2b0-3f00af16e06c" alt=""><figcaption></figcaption></figure>

8. After your application is saved, click **Configure Application**.

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FkKjIxinP7lmgmBnVsiGD%2F_7.png?alt=media&#x26;token=79a10a93-a5c2-4cad-8450-6fb7f61b10a7" alt=""><figcaption></figcaption></figure>

9. On the **SSO** tab of the configuration modal:

   a. Enter "getupdraft" in the **SP Entity ID** field.

   b. Copy the **Assertion Consumer Service URL** from Updraft that you saved earlier and paste it into the **ACS URL** field. (<https://getupdraft.com/saml2\\_auth/acs/>)

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FJ9gUZptMy0Yp1kqjqio0%2Fa%20(1).png?alt=media&#x26;token=e6251d8f-533d-4be6-a6d1-2a0f5d9ede21" alt=""><figcaption></figcaption></figure>

c. Leave the **SAML Subject NameID** set to **username**.

d. In the **SAMLSubject NameID-Format** field, select **urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified** from the dropdown menu.

e. Set the **Signature Algorithm** to **RSA-SHA256**.

f. Select **Sign Assertion and Response**.

g. Select Checkbox **Declare Redirect Endpoint**

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2Fs3eMiyjOrT4dY8EEzYTw%2Fd.png?alt=media&#x26;token=3396d3c6-6e19-4066-898b-63e31956583c" alt=""><figcaption></figcaption></figure>

h. Add the following **User Attributes**:

* email = email
* username = email
* first\_name = firstname
* last\_name = lastname

i. Activate **Group Attributes** and enter "groups"

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FJvvCBzVylHC6sZNavNnE%2Fh.png?alt=media&#x26;token=c6bcb55b-3be0-43cf-a9e2-b35c263a9602" alt=""><figcaption></figcaption></figure>

10. Download the **Metadata XML File**
11. Click **Save**

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FFUAiYwfK7gnaYlIoLORJ%2Fa%20(2).png?alt=media&#x26;token=4ca36b98-4ad7-4bc8-9457-e8a2db57f89d" alt=""><figcaption></figcaption></figure>

12. On the **User Groups** tab:
    * Add a user group to the SSO application. If you want to restrict who can access the SSO app, create another user group in your JumpCloud console and assign it to the SSO app.&#x20;

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2F45jdVBlJRuZXgXxxLSag%2FScreenshot%202024-10-21%20151901.png?alt=media&#x26;token=1d785baa-3e72-45ae-9005-5e262a6cc6c7" alt=""><figcaption></figcaption></figure>

## Step 3 `-` Upload the .xml metadata to your Updraft Organization

1. Click **Choose File** and select your **Metadata XML file**
2. Click **Save**

<figure><img src="https://1499220200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LDXK35bj42Hdun3u_Zb-165900098%2Fuploads%2FdXNkQfXQw7XVmKNs79zx%2FDesign%20ohne%20Titel.png?alt=media&#x26;token=146a4162-00a9-44d3-a746-09c3d590b05e" alt=""><figcaption></figcaption></figure>

## Step 4 - verify the integration

After following all the above steps, log in to your Updraft account to verify that you are now able to sign in with your Custom SSO (JumpCloud).&#x20;

If the integration was successful:

1. If you are opening your subdomain.getupdraft.com/login page you will see the Login with Custom SSO Button
2. When your assigned Users click on the Login with SSO Button they will  be redirected to the JumpCloud login page
3. upon successful authentication with JumpCloud, your users will be logged into Updraft automatically and redirected to the dashboard page of Updraft
4. A new account for your uses will be created in Updraft after they logged-in the first time
5. Now you can assign projects and apps to your users.

&#x20;If you encounter any issues, please refer back to the previous steps or reach out to the support team for assistance.
