- 3 minutes to read
- Print
- DarkLight
- PDF
How to integrate with JumpCloud
- 3 minutes to read
- Print
- DarkLight
- PDF
This tutorial provides a guide on how to integrate senhasegura with JumpCloud, using SAML as the authentication protocol. The configuration of the integration occurs in parallel, alternating the inclusion of information from one environment to the other, until completion.
Requirements:
- Administrator profile in the JumpCloud account.
- User group in the JumpCloud account with all users who will access senhasegura via JumpCloud.
Step 1: Create the application in JumpCloud
- On the left sidebar of JumpCloud, locate the User Authentication section.
- Select SSO.
- Click Add New Application.
- In the search field, look for SAML.
- In Custom SAML App, click configure.
In the General Info tab
- Fill in the Display Label field with the name of your application.
In the SSO tab
Add the information:
- IdP Entity ID: unique identifier.
- SP Entity ID:
SENHASEGURA_SERVICE_PROVIDER
- ACS URLs:
https://sua_url/flow/saml/auth/assert
- SAMLSubject NameID: select the information that users will use to log in.
- SAMLSubject NameID Format: select one of the SAML 2.0 options corresponding to the previous field.
- Signature Algorithm: select RSA-SHA256.
- Default RelayState: leave it blank.
- Login URL:
https://sua_url/flow/saml/auth/assert
- IDP URL: replace the default name with another identification.
In the User Groups tab
- Select the group that will access the application and click activate.
- A confirmation message of the new SSO connection will appear.
- Click continue to complete the process.
If successful, the application appears on the Configured Applications page.
Click on the certificate download link in the blue pop-up message at the upper-right corner. You’ll need this information later.
Keep JumpCloud open for the next configurations.
Step 2: Enable the SAML provider in senhasegura
- In the top-left corner of the senhasegura platform, click Grid Menu ⁝⁝⁝, indicated by the box of nine squares, and select Settings.
- Select Authentication ➔ Providers.
- In the list of providers, locate the SAML option.
- In the Enabled column, make sure the option is enabled.
4.1 If necessary, click Enable, the icon represented by a checkmark (✓).
Step 3: Create a SAML provider in senhasegura
- In the top-left corner of the senhasegura platform, click Grid Menu ⁝⁝⁝, indicated by the box of nine squares, and select Settings.
- Select Settings ➔ Authentication ➔ SAML ➔ Providers.
- In the top-right corner, click View actions, the icon represented by three vertical dots (⁝).
- Select New provider.
In the Main information tab
Add the information:
- Type: select SAML provider.
- Enable: keep it as Yes.
- Entity ID: fill in with the same name entered in the Display Label field.
- SAML provider metadata URL: fill in with the URL.
4.1 Find this information in the JumpCloud SSO tab. Click on the Copy Metadata URL button. - Domain or public IP for URL Redirection: fill in with the URL of senhasegura or the domain.
- Redirect URL: automatic fill-in.
- SSO Logout URL (Sign-out URL): fill in with the URL.
7.1 Find this information in the JumpCloud SSO tab. Copy the information from the IDP URL field. - Redirect binding type: select POST.
In the Security SAML tab
Add the information:
- Download the provider's certificate and copy its content.
- Certificate (PEM format): paste the certificate content.Info
If you haven't saved the certificate information, go to the left sidebar menu of the application you created, click IDP Certificate Valid, and then select Download certificate.
- Click Save.
The system displays a success message, and the provider appears listed on the home page.
Step 4: Access senhasegura via JumpCloud
- On the home page of the senhasegura platform, click Sign in with SSO.
- Click SAML Provider. You’ll be redirected to the JumpCloud authentication screen to enter your credentials.
- After authentication, click on the senhasegura application to access the vault.
Do you still have questions? Reach out to the senhasegura Community.