Skip to content
Talk to an Engineer Dashboard

JumpCloud - OIDC

Learn how to set up OpenID Connect (OIDC) Single Sign-On (SSO) using JumpCloud, with step-by-step instructions for OIDC application setup.

This guide walks you through configuring JumpCloud as your OIDC identity provider. You’ll create a custom OIDC application, add the redirect URI, provide the required OIDC values in the SSO Configuration Portal, assign access, test the connection, and then enable Single Sign-On.

  1. Sign in to your JumpCloud Admin Portal. Go to Access -> SSO Applications and click Add New Application.

    JumpCloud SSO Applications page with Add New Application

    In the application catalog, search for OIDC and select Custom OIDC App. Search for Custom OIDC App in JumpCloud

    Continue through the setup, confirm the OIDC app selection by clicking Next. Select Custom OIDC App in JumpCloud

    Enter a recognizable Application name in Display Label field, and optionally upload an icon and click Next. Enter general information for the JumpCloud OIDC application

    Click Configure Application. JumpCloud Custom OIDC App review step with Configure Application button

  2. From the SSO Configuration Portal, copy the Redirect URI under Service Provider Details. SSO Configuration Portal showing the JumpCloud OIDC Redirect URI

    In JumpCloud, open the recently created OIDC application and navigate to SSO -> Configuration Settings. Paste the copied URI into the Redirect URI field. Add the login url of your application in Login URL field. JumpCloud SSO configuration settings with Redirect URI and Login URL fields

  3. Scroll down to Attribute Mapping section, select Email and Profile as Standard Scopes and then click Activate. JumpCloud attribute mapping with Email and Profile standard scopes selected

  4. From JumpCloud, copy the Client ID and Client Secret. For Issuer URL, use https://oauth.id.jumpcloud.com. JumpCloud application activated dialog showing Client ID and Client Secret

    Add these values under Identity Provider Configuration in the SSO Configuration Portal, then click Update. SSO Configuration Portal fields for JumpCloud Client ID and Client Secret SSO Configuration Portal showing the JumpCloud Issuer URL after update

  5. On JumpCloud, navigate to User Groups tab. Assign the appropriate user groups to the new OIDC application and click Save. JumpCloud User Groups tab with assigned groups selected for the OIDC app

  6. In the SSO Configuration Portal, click Test Connection to verify your configuration.

  7. Once the test succeeds, click Enable Connection to allow assigned users to sign in with JumpCloud OIDC. SSO Configuration Portal with Enable Connection button for JumpCloud OIDC

    This completes the JumpCloud OIDC SSO setup for your application.