JumpCloud Integration Example

This example describes how to integrate JumpCloud as an identity provider (IdP) with an Oxide silo using SAML. It assumes you have JumpCloud administrator access and access to the Oxide Console with fleet admin permissions.

Create SAML Application in JumpCloud

  1. Log in to the JumpCloud Admin Console.

  2. Go to SSO Applications and create a new Custom SAML application.

  3. Set the following fields:

  4. Check Declare Redirect Endpoint (a JumpCloud requirement).

  5. Under Attributes, add:

    • Service Provider Attribute Name: group

    • JumpCloud Attribute Name: group

  6. Under Sign, check:

    • Assertion and Response

  7. Save and copy:

    • Metadata URL (JumpCloud SAML metadata)

    • IdP Entity ID (JumpCloud Entity ID)

Configure Users and Groups in JumpCloud

Assign users to the JumpCloud app and set their Custom Attributes:

  • Navigate to Users.

  • Edit user details and set the custom attribute group to admin (or other group names you intend to use in Oxide).

  • Confirm that user groups match what’s expected in the Oxide Silo setup.

Configure Oxide Silo and Identity Provider

Create Silo in Oxide

In the Oxide Console:

  1. Go to System > Silos and create a new silo.

  2. Silo Name: Should match the name you used in JumpCloud.

  3. Admin Group Name: Must match the group attribute in JumpCloud (e.g., admin).

  4. Upload a TLS certificate valid for the silo domain.

Create Identity Provider in Oxide

In the silo’s Identity Provider tab, click New Provider.

FieldJumpCloud Value

Provider Name

"jumpcloud" or another descriptive name

Service provider client ID

The ACS URL (JumpCloud requires the full URL here)

Entity ID

The IdP Entity ID copied from JumpCloud

ACS URL

Auto-generated by Oxide https://$SILO_NAME.sys.$RACK_FQDN/login/$SILO_NAME/saml/jumpcloud

Group attribute name

"group" (or your custom attribute name)

Metadata source

Use the JumpCloud Metadata URL

Cert/Key files

If request signing is used, supply these in DER format

Log in to Oxide

Once configuration is complete, log in to the Oxide Silo via the JumpCloud SSO method.

JumpCloud SSO login

Oxide automatically creates groups and assigns users to them based on the group attribute sent by JumpCloud in the SAML assertion.

Tip
If login issues occur, check that the user’s group attribute in JumpCloud matches the Oxide Admin Group Name.