JumpCloud (SAML)
JumpCloud ↗ provides SSO identity management. Cloudflare Access integrates with JumpCloud as a SAML identity provider.
-
In the JumpCloud Admin Portal ↗, go to SSO Applications.
-
Select Add New Application.
-
In the search bar, enter
Cloudflareand select the Cloudflare Access application. -
Select Next.
-
In Display Label, enter an application name.
-
Select Save Application.
-
Review the application summary and select Configure Application.
-
In the SSO tab, configure the following settings:
-
In IdP Entity ID, enter your Cloudflare team domain:
https://<your-team-name>.cloudflareaccess.com/You can find your team name in Zero Trust under Settings > Custom Pages.
-
Set both SP Entity ID and ACS URL to the following callback URL:
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback -
Scroll up to JumpCloud Metadata and select Export Metadata. Save this XML file for use in a later step.
-
-
In the User Groups tab, assign user groups ↗ to this application.
-
Select Save.
-
In Zero Trust ↗, go to Settings > Authentication.
-
Under Login methods, select Add new.
-
Select SAML.
-
Upload your JumpCloud XML metadata file.
-
Select Save.
You can now test your connection and create Access policies based on the configured login method and SAML attributes.
{ "config": { "issuer_url": "jumpcloud", "sso_target_url": "https://sso.myexample.jumpcloud.com/saml2/cloudflareaccess", "attributes": ["email", "name", "username"], "email_attribute_name": "", "sign_request": false, "idp_public_cert": "MIIDpDCCAoygAwIBAgIGAV2ka+55MA0GCSqGSIb3DQEBCwUAMIGSMQswCQYDVQQGEwJVUzETMBEG\nA1UEC.....GF/Q2/MHadws97cZg\nuTnQyuOqPuHbnN83d/2l1NSYKCbHt24o" }, "type": "saml", "name": "jumpcloud saml example"}