JumpCloud

  1. Login to your JumpCloud admin account.

  2. Navigate to SSO Applications\

  3. Add a new SSO Application

  4. Select "Custom" on this screen.

  5. Select "Configure SSO with OIDC".

  6. Fill the app's display label in the next form.\

  7. After finishing this configuration, you will be redirected to your newly created SSO Application's settings. Go to the "SSO" tab first.

  8. Configure as following:

    Make sure to set the correct Redirect URI and Login URL that will reflect your Defguard's setup. If you access your Defguard dashboard at e.g. https://defguard.example.net your redirect URI will be https://defguard.example.net/auth/callback and the login URL https://defguard.example.net/auth/login. Additionally, if you are using a Defguard proxy to enrol users, you can also add another redirect URI in the form of <DEFGUARD_ENROLLMENT_URL>/openid/callback, where the <DEFGUARD_ENROLLMENT_URL> is the address at which your proxy enrollment page is accessible.

  9. Next, select the profile scope and add an email user attribute mapping by hand, like so:

    It's important not to select the email standard scope checkbox, as it will automatically add a constant email_verified field which doesn't conform to the OpenID standard and doesn't work with Defguard. You can see the following section for more information: JumpCloud.

  10. Click "Activate". You will be presented with a client ID and a secret. Copy both of them, as you will need to insert them in Defguard's settings.

  11. Go to Defguard settings, OpenID tab, select JumpCloud provider tab and paste the copied values:

  12. Back in JumpCloud, make sure your users have access to the SSO Application. You can enable it by navigating to the User groups menu and selecting the group you want to enable logging in through JumpCloud for. Only users from this group will be able to log in to Defguard with JumpCloud. In this example, we will select the All users group, which is a dynamic group containing every user.

  13. Now in the group settings menu, select the Applications tab and select the checkbox next to your newly created app, this will enable the app for that group. Click Save group when you finish.

  14. Now you should be able to log in to Defguard with JumpCloud.

Directory synchronization

Defguard supports synchronizing groups' and users' states based on your JumpCloud directory.

Make sure to check the general guide to directory synchronization to learn more about the available configuration options.

Setup

  1. Generate a new API key (or use an existing one). This can be done by clicking your user icon in the upper right corner and selecting "My API key"

  2. If you already generated an API key, you will have to regenerate it here (please note that regenerating the API key may break your existing integrations that already use it).

  3. Copy the newly generated API key and navigate to your Defguard instance's settings.

  4. Paste the key into the "JumpCloud API key" field

  5. The JumpCloud directory synchronization should now work and your users' state and group memberships should be periodically synchronized.

Last updated

Was this helpful?