# JumpCloud User provisioning

## Supported features <a href="#supported-features" id="supported-features"></a>

* **Create users -** JIT provisioning when they first login to Currents.
* **Update user attributes -** accept name updates for users.
* **Deactivate users - p**revents the user from logging into Currents, deactivated users are removed from the Currents team member list.
* **Import users -** Link your existing Currents users to their JumpCloud user.

For more information on the listed features, visit the [JumpCloud Support Page](https://jumpcloud.com/support/provision-and-manage-users-and-groups-in-apps-using-custom-scim-identity-management-integration).

## Requirements <a href="#requirements" id="requirements"></a>

Provisioning is available for customers with an active subscription.

In order to setup provisioning you first need to:

* Setup the SAML integration with [](https://docs.currents.dev/administration/sso-saml2.0/jumpcloud "mention")
* Reach out to the Currents support team to have provisioning enabled for your organization.

## Configuration Steps <a href="#configuration-steps" id="configuration-steps"></a>

#### Currents Configuration

* Login as an Admin and navigate to the **Manage Team** page.

<figure><img src="https://3745692499-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FqmFDEiUa9mr11LUlxDnt%2Fuploads%2FgWNElUtWsETS35md1U5A%2FScreenshot%202026-01-19%20at%2019.36.49.png?alt=media&#x26;token=813fd0bf-a8ad-46dc-9142-29fbb87ff6de" alt=""><figcaption><p>Navigate to the Manage Team page</p></figcaption></figure>

* Click the **Show SCIMv2 Details** button in the **DOMAIN ACCESS & SSO** section of the page.

<figure><img src="https://3745692499-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FqmFDEiUa9mr11LUlxDnt%2Fuploads%2FBSyx9GijiOsbn2IjpYCg%2Fimage.png?alt=media&#x26;token=737fa225-8f57-496a-be35-3bfafa832c19" alt=""><figcaption><p>Getting the SCIM details from the Manage Team page</p></figcaption></figure>

* Note the **Endpoint** and **Token** details for JumpCloud Configuration

### JumpCloud Configuration

* Navigate to the existing Currents SSO Application in JumpCloud **USER AUTHENTICATION** > **SSO Applications**. Click on the Currents SSO Application you previously setup.

  <figure><img src="https://3745692499-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FqmFDEiUa9mr11LUlxDnt%2Fuploads%2FCS618o0HwPFvvAVeiR9E%2FCurrentsJumpCloudSSO.png?alt=media&#x26;token=4843a0b2-8c0b-4045-a27f-9b9700e1aa28" alt=""><figcaption><p>Navigate tot he Currents App</p></figcaption></figure>
* Select the **Identity Management** tab. Then provide the **Base URL** (Endpoint) and **API Token** information from Currents. Also enter a **Test User Email** that does not already exist in Currents.
* Click **Test Connection** and verify it was successful.
* Toggle off **Group Management** and click **Activate** to verify the [default mappings](https://jumpcloud.com/support/provision-and-manage-users-and-groups-in-apps-using-custom-scim-identity-management-integration#custom-scim-user-attributes).
* If everything was succeful, click **Save**

<figure><img src="https://3745692499-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FqmFDEiUa9mr11LUlxDnt%2Fuploads%2FisvxMitlbxCaBz5hz0De%2FCurrentsJumpCloudSCIM.png?alt=media&#x26;token=981a3869-9954-4b36-b2d9-7144e079c10a" alt=""><figcaption><p>Configure and Test the API Credentials</p></figcaption></figure>

* Navigate to the Current SSO App again, and back into the **Identity Management Tab**
* Use the **manual import** button to find your existing Currents accounts

<figure><img src="https://3745692499-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FqmFDEiUa9mr11LUlxDnt%2Fuploads%2FlQfna3lTQJWYB9kXJlhv%2FCurrentsJumpCloudManualImport.png?alt=media&#x26;token=05bd99ba-5b76-4197-9352-a378a6785611" alt=""><figcaption><p>Import Users</p></figcaption></figure>

* Your existing users should have been auto-matched based on email. If there are any additional Currents users that failed to be matched, you can import them from the import screen. (See [JumpCloud's Importing Users Guide](https://jumpcloud.com/support/provision-and-manage-users-and-groups-in-apps-using-custom-scim-identity-management-integration#importing-users))

## Known Issues/Troubleshooting

#### Unsupported Features

The Currents User Provisioning does not support the following JumpCloud Identity Management features:

* Group Management
* Sync password

#### Limited profile attributes updates

Currents does not accept updates to the following attributes:

* **userType** - changing a user's role is only supported from the Currents team member dashboard
* **userName** - the mapped userName must match the primary email
* **email** - the primary email cannot be changed

#### Username errors on import

JumpCloud attempts to use the first part of the email as the username when importing new users from Currents.  (eg, `andrew@currents.dev` becomes `andrew` )

If your users have a `+` character in their email, the import will fail. To workaround, first create the user in JumpCloud, then sync them with Currents. JumpCloud and Currents will sync based on the user email.

#### User Activation Error

When setting up Identify Management in JumpCloud, you must use a new user as the test email, otherwise you get errors during the test. This is referenced in [JumpCloud's SCIM Important Considerations](https://jumpcloud.com/support/provision-and-manage-users-and-groups-in-apps-using-custom-scim-identity-management-integration).
