JumpCloud SSO Setup
This guide walks through configuring SAML 2.0 single sign-on between JumpCloud and SyVault. You will need JumpCloud admin access and SyVault Owner or Admin privileges.
Prerequisites
- SyVault organization on a Business or Enterprise plan
- JumpCloud admin account with permission to create SSO applications
- Your SyVault organization slug (found in Admin Console > Settings)
Step 1: Create a Custom SAML Application in JumpCloud
- Log in to the JumpCloud Admin Portal at console.jumpcloud.com.
- Navigate to SSO Applications in the left sidebar.
- Click + Add New Application.
- Select Custom SAML App from the application list.
- Enter SyVault as the Display Label.
- Optionally upload the SyVault logo.
- Click Activate to proceed to configuration.
Step 2: Configure SAML Settings
In the SSO tab of the new application, enter the following values:
| Field | Value |
|---|---|
| IdP Entity ID | Leave as the JumpCloud default (auto-generated) |
| SP Entity ID | syvault:<your-org-slug> (e.g., syvault:acme-corp) |
| ACS URL | https://api.syvault.com/api/auth/saml/acs |
| SAMLSubject NameID | email |
| SAMLSubject NameID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
| Signature Algorithm | RSA-SHA256 |
| Sign Assertion | Checked |
| Default RelayState | Leave blank |
| Login URL | https://vault.syvault.com/login?sso=<your-org-slug> |
The SP Entity ID must be exactly syvault:<your-org-slug> with no trailing slashes or spaces. A mismatched Entity ID is the most common cause of SSO configuration failures.
Step 3: Configure Attribute Mapping
Scroll to the User Attribute Mapping section and add the following attributes:
| Service Provider Attribute Name | JumpCloud Attribute Name |
|---|---|
email | email |
firstName | firstname |
lastName | lastname |
These attributes are sent in the SAML assertion and used by SyVault to identify and provision the user session.
Step 4: Download IdP Metadata
- Still on the SSO tab, scroll to the JumpCloud Metadata section.
- Click Export Metadata to download the IdP metadata XML file.
- Save this file -- you will upload it to SyVault in the next step.
Alternatively, copy the IDP URL which serves the metadata dynamically.
Step 5: Configure SyVault
- Open the SyVault Admin Console > SSO & SCIM > SAML SSO.
- Paste the IDP URL or upload the downloaded metadata XML file.
- SyVault will automatically extract:
- IdP SSO URL
- IdP Issuer / Entity ID
- X.509 signing certificate
- Verify the extracted values look correct.
- Click Save Configuration.
Step 6: Assign Users and Groups
Back in the JumpCloud Admin Portal:
- In the SyVault application, click the User Groups tab.
- Select the user groups that should have SSO access to SyVault.
- Alternatively, click the Users tab to assign individual users.
- Click Save.
Only users who are also members of your SyVault organization can complete SSO login. Assigning a user in JumpCloud who has not been invited to SyVault will result in a login error. Use SCIM provisioning to automate member creation when users are assigned in JumpCloud.
Step 7: Test SSO Login
- In the SyVault Admin Console, click Test Connection. This opens a new browser window, sends a SAML AuthnRequest to JumpCloud, and verifies the response.
- If the test succeeds, you will see a green confirmation message with the authenticated email address.
- For a full end-to-end test: open a private/incognito browser window, go to the SyVault login page, click Login with SSO, enter your organization slug, and authenticate through JumpCloud.
- After successful authentication, you will be redirected back to SyVault and prompted for your master password.
Troubleshooting
| Symptom | Likely Cause | Fix |
|---|---|---|
| "Invalid audience" error | SP Entity ID mismatch | Verify the SP Entity ID in JumpCloud matches syvault:<org-slug> exactly |
| "Signature validation failed" | Certificate mismatch or rotation | Re-download the IdP metadata and re-upload to SyVault |
| "User not found" error | User not a SyVault member | Invite the user to SyVault or enable SCIM provisioning |
| Redirect loop | RelayState issue | Ensure Default RelayState is blank in JumpCloud |
| SAML response timeout | Clock skew between servers | Ensure JumpCloud and SyVault server clocks are within 5 minutes |
| "App not configured" in JumpCloud | User not assigned to the app | Assign the user or their group to the SyVault application |
JumpCloud supports SCIM 2.0 for automated user provisioning. Once SAML SSO is configured, you can enable SCIM to automatically create and deactivate SyVault members when users are assigned or removed in JumpCloud. See SCIM Provisioning for setup instructions.