Configuring JumpCloud For SSO
This section documents the standard configuration for JumpCloud as an identity provider to support log in to the DataGrail app. With this configuration, user roles must be managed within DataGrail.
Persons Needed to Complete Configuration: IT Person from your organization
- Log in to JumpCloud as an Administrator.
- Navigate to the configured applications by selecting User Authentication and SSO.
- Add a new application and select Custom SAML App.
- Complete the Single-Sign On Configuration.
SAML Configuration
IdP Entity ID: jumpcloud-datagrail
SP Entity ID: https://{customer_subdomain}.datagrail.io/saml/metadata
ACS URL: https://{customer_subdomain}.datagrail.io/saml/auth
SAMLSubject Name ID: email
SAMLSubject NameID Format: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Signature Algorithm: RSA-SHA256
Login URL: https://{customer_subdomain}.datagrail.io/saml/login
IdP URL: https://sso.jumpcloud.com/saml2/datagrail
Attributes (User Attributes):
Service Provider Attribute Name | JumpCloud Attribute Name |
---|---|
email | email |
first_name | firstname |
last_name | lastname |
<subdomain>
should be replaced with the subdomain configured for your account. If you log in to DataGrail at yourcompanyname.datagrail.io
, your subdomain will be yourcompanyname
.
If you are unclear on what your subdomain would be, please confirm with your Account Manager or reach out to support@datagrail.io.
- Open the User Groups tab and select the group of users your want to provide access to DataGrail.
- Save and copy the XML Formatted Metadata.
- Send the XML Formatted Metadata to DataGrail at support@datagrail.io. We will complete the configuration.
For more information on adding users and managing roles, see Inviting New Users.
Disclaimer: The information contained in this message does not constitute as legal advice. We would advise seeking professional counsel before acting on or interpreting any material.