JumpCloud

Setting up SAML2.0 SSO with JumpCloud as an IdP for Currents

Enabling SSO will affect all users of your organization, users would not be able to sign in to Currents using a different authorization method when SSO is enabled.

Supported Features

Setup Steps

1

Create a new SSO Application: User Authentication > SSO Applications > + Add New Application.

Type Currents and then click Create a Custom Integration > Next

Creating Custom SSO Integration
2

Choose Integration Options

  • ✅ Select Manage SSO + Configure SSO with SAML

  • Export user to this app

  • Click Next, set Integration Name, then click Create Application

Creating Custom JumpCloud SSO Integration
3

Configure SSO Settings

  • Fill in the fields according the values defined in SAML2.0 Configuration

    • SP Entity ID

    • ACS URL

    • SAMLSubject NameID

    • SAMLSubject NameID Format

    • Signature Algorithm: RSA-SHA256

    • Login URL: you will be able to define the login URL after Currents support team activated the integration. See IdP-initiated Sessions.

    • Attributes: email and fullname

  • Click Export Metadata, ensure the generated metadata XML has HTTP-POST and HTTP-Redirect bindings, for example:

    <md:SingleSignOnService
        Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
        Location="https://sso.jumpcloud.com/saml2/currents"
    />
    <md:SingleSignOnService
        Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
        Location="https://sso.jumpcloud.com/saml2/currents"
    />
4

Done

  • Share the Metadata XML file together with other details appearing in SAML2.0 Configuration with Currents support team to active the SSO.

  • Assign users or groups to the newly created SSO application

  • Set Login URL after Currents support team activated the integration. See IdP-initiated Sessions.

Last updated

Was this helpful?