JumpCloud SSO and SCIM Setup Guide
This guide walks you through configuring JumpCloud as your Identity Provider (IdP) for CRA Evidence single sign-on (SAML SSO) and automated user provisioning (SCIM).
Overview
JumpCloud is a cloud-based directory platform that provides identity and access management. This guide covers:
- SAML 2.0 SSO: Authenticate users through JumpCloud
- SCIM 2.0 Provisioning: Automatically create, update, and deactivate users
JumpCloud Free Tier
JumpCloud offers a free tier that includes:
- 10 users and 10 devices
- Full SSO (SAML) capabilities
- SCIM provisioning support
- MFA and conditional access
This makes JumpCloud an excellent choice for small teams or for testing enterprise SSO before committing to a larger IdP.
Prerequisites
Before starting, ensure you have:
- JumpCloud Account: Sign up at https://jumpcloud.com/signup
- JumpCloud Admin Access: You need admin privileges to create applications
- CRA Evidence Running: Your CRA Evidence instance must be accessible (e.g.,
https://app.craevidence.comor your self-hosted URL) - CRA Evidence Organisation Admin: You need admin access to configure SSO settings
Part 1: SAML SSO Setup
Step 1: Get CRA Evidence SP Information
Before configuring JumpCloud, gather the Service Provider (SP) information from CRA Evidence:
- Log in to CRA Evidence as an organisation admin
- Go to Settings > Single Sign-On
- Note the following values:
| Field | Value |
|---|---|
| Entity ID (Issuer) | https://app.craevidence.com |
| ACS URL | https://app.craevidence.com/api/v1/saml/acs |
| Metadata URL | https://app.craevidence.com/api/v1/saml/metadata |
Note: Replace
app.craevidence.comwith your actual CRA Evidence domain if self-hosted.
Step 2: Create JumpCloud Custom SAML Application
- Log in to your JumpCloud Admin Console at https://console.jumpcloud.com
- Navigate to SSO in the left sidebar
- Click + Add New Application
- Click Custom SAML App at the bottom of the application list
Step 3: Configure General Settings
In the General Info tab:
| Field | Value |
|---|---|
| Display Label | CRA Evidence |
| Description | CRA Evidence - EU Cyber Resilience Act Compliance Platform |
| Logo | Upload the CRA Evidence logo (optional) |
Click Continue to proceed.
Step 4: Configure SSO Settings
In the SSO tab, configure the following:
IdP Entity ID Configuration
| Field | Value |
|---|---|
| IdP Entity ID | Leave as auto-generated or set a custom value like jumpcloud-craevidence |
SP Entity ID & ACS URL
| Field | Value |
|---|---|
| SP Entity ID | https://app.craevidence.com |
| ACS URL | https://app.craevidence.com/api/v1/saml/acs |
SAMLSubject NameID
| Field | Value |
|---|---|
| SAMLSubject NameID | email |
| NameID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Signing Settings
| Field | Recommended Value |
|---|---|
| Sign Assertion | Enabled |
| Sign Response | Enabled |
| Signature Algorithm | RSA-SHA256 |
Login URL (Optional)
| Field | Value |
|---|---|
| Login URL | https://app.craevidence.com/login |
| Default RelayState | Leave blank |
Step 5: Configure Attribute Mappings
In the SSO tab, scroll to User Attribute Mapping and add the following:
| Service Provider Attribute | JumpCloud Attribute |
|---|---|
email |
email |
firstName |
firstname |
lastName |
lastname |
displayName |
displayname |
To add custom attributes:
- Click + Add Attribute
- Enter the Service Provider Attribute Name (left column)
- Select the corresponding JumpCloud Attribute (right column)
Step 6: Save and Get IdP Information
- Click Activate or Save to create the application
- After saving, go back to the application settings
- Click on the SSO tab
- Find and copy/download the following:
| Item | Where to Find |
|---|---|
| IdP Certificate | Click Download certificate or copy the certificate text |
| IdP URL (SSO URL) | Listed under "IDP URL" or "Single Sign-On URL" |
| IdP Entity ID | Listed under "IdP Entity ID" |
Alternatively, click Download metadata to get an XML file containing all IdP information.
Step 7: Configure CRA Evidence with JumpCloud IdP
- In CRA Evidence, go to Settings > Single Sign-On
- Click Add Identity Provider
- Fill in the form:
| Field | Value |
|---|---|
| Name | JumpCloud (or your preferred name) |
| Vendor | Generic SAML 2.0 |
| Entity ID | The "IdP Entity ID" from JumpCloud |
| SSO URL | The "IDP URL" from JumpCloud |
| SLO URL | Leave blank (optional) |
| X.509 Certificate | Paste the certificate from JumpCloud |
Provisioning Settings
| Field | Recommended Value |
|---|---|
| JIT Provisioning | Enabled |
| Default Role | Member |
| Update on Login | Enabled |
- Click Add Identity Provider
Step 8: Add and Verify SSO Domain
- In CRA Evidence SSO settings, go to Domains
- Click Add Domain
- Enter your email domain (e.g.,
company.com) - Select the JumpCloud IdP you just created
- Click Add Domain
Verify Domain Ownership
-
Add a DNS TXT record to your domain:
- Host/Name:
_craevidence-verification - Value: (the verification token shown in CRA Evidence)
- TTL: 3600 (or your default)
- Host/Name:
-
Wait for DNS propagation (can take up to 48 hours, usually much faster)
-
Click Verify Now in CRA Evidence
Step 9: Assign Users to the Application in JumpCloud
-
In JumpCloud Admin Console, go to SSO
-
Click on your CRA Evidence application
-
Go to the User Groups tab
-
Click + Add User Groups and select groups that should have access
OR
-
Go to the Users tab
-
Click + Add Users and select individual users
Step 10: Test SSO Flow
- Open a new incognito/private browser window
- Go to
https://app.craevidence.com/login - Enter an email address from your SSO domain (e.g.,
user@company.com) - Click Continue - you should be redirected to JumpCloud
- Authenticate with your JumpCloud credentials
- After successful authentication, you should be redirected back to CRA Evidence and logged in
Part 2: SCIM Provisioning Setup
SCIM (System for Cross-domain Identity Management) enables automatic user lifecycle management. When you add or remove users in JumpCloud, they are automatically provisioned or deprovisioned in CRA Evidence.
Step 1: Enable Identity Management in JumpCloud
- In JumpCloud Admin Console, go to SSO
- Click on your CRA Evidence application
- Go to the Identity Management tab
- Enable SCIM provisioning
Step 2: Create SCIM Client in CRA Evidence
- In CRA Evidence, go to Settings > SCIM Provisioning
- Click Add SCIM Client
- Fill in the form:
| Field | Value |
|---|---|
| Name | JumpCloud Provisioning |
| Description | SCIM client for JumpCloud user provisioning |
| Default Role | Member (or Viewer for read-only access) |
| Auto-activate users | Enabled |
| Sync attributes | Enabled |
| Allow deactivation | Enabled |
| Allow deletion | Disabled (recommended for safety) |
-
Click Create Client
-
IMPORTANT: Copy the Bearer Token that is displayed. This token is shown only once and cannot be retrieved later.
scim_xxxxxxxxxxxxxxxxxxxxxxxxxxxx
Step 3: Configure SCIM Settings in JumpCloud
- In JumpCloud, in the Identity Management tab of your CRA Evidence application
- Configure the SCIM connection:
| Field | Value |
|---|---|
| Base URL | https://app.craevidence.com/scim/v2 |
| Token Key | Bearer scim_xxxxxxxxxxxxxxxxxxxxxxxxxxxx (the token from step 2) |
Note: Include the word
Bearerfollowed by a space before your token.
- Click Save or Test Connection
Step 4: Test SCIM API Connection
JumpCloud should show a success message if the connection is working. You can also verify manually:
- In JumpCloud, click Test Connection in the Identity Management settings
- JumpCloud will call the SCIM discovery endpoints:
GET /scim/v2/ServiceProviderConfigGET /scim/v2/ResourceTypesGET /scim/v2/Schemas
If the test fails:
- Verify the Base URL is correct (no trailing slash)
- Confirm the Bearer token is correct and includes the
Bearerprefix - Check that the SCIM client is enabled in CRA Evidence
Step 5: Configure User Provisioning
In JumpCloud's Identity Management settings, configure:
| Setting | Recommended Value |
|---|---|
| Provision users | Enabled |
| Deprovision users | Enabled |
| Update user attributes | Enabled |
Attribute Mapping
Ensure the following mappings are configured:
| JumpCloud Attribute | SCIM Attribute |
|---|---|
email |
userName |
email |
emails[type eq "work"].value |
firstname |
name.givenName |
lastname |
name.familyName |
displayname |
displayName |
Step 6: Test User Sync
- In JumpCloud, assign a test user to the CRA Evidence application
- Wait a few moments for SCIM sync (usually immediate)
- In CRA Evidence, go to Settings > Users
- Verify the user was created with:
- Correct email
- Correct name
provisioned_via: scimflag
Part 3: User Groups (Optional)
JumpCloud supports group-based application assignment, which simplifies user management.
Create User Groups in JumpCloud
- In JumpCloud Admin Console, go to User Groups
- Click + Add Group
- Configure the group:
| Field | Example Value |
|---|---|
| Name | CRA Evidence Users |
| Description | Users with access to CRA Evidence |
- Click Save
Add Users to Groups
- Go to User Groups and click on your group
- Go to the Users tab
- Click + Add Users and select users to add
Assign Groups to Application
- Go to SSO and click on your CRA Evidence application
- Go to the User Groups tab
- Click + Add User Groups
- Select the groups that should have access
Group-Based Provisioning
When using SCIM with groups:
- Users added to assigned groups are automatically provisioned
- Users removed from all assigned groups are automatically deprovisioned
Part 4: Testing Checklist
Use this checklist to verify your configuration:
SSO Login Flow
- [ ] User can initiate login from CRA Evidence login page
- [ ] Email domain is recognized and redirects to JumpCloud
- [ ] JumpCloud authentication succeeds
- [ ] User is redirected back to CRA Evidence dashboard
- [ ] User session is created in CRA Evidence
JIT Provisioning (First-Time Login)
- [ ] New user (not previously in CRA Evidence) can log in via SSO
- [ ] User account is created in CRA Evidence
- [ ] User has correct name and email
- [ ] User has the default role (Member)
- [ ] User appears in CRA Evidence user list
SCIM User Lifecycle
- [ ] Creating a user in JumpCloud creates them in CRA Evidence
- [ ] Updating user attributes in JumpCloud updates CRA Evidence
- [ ] Deactivating a user in JumpCloud deactivates them in CRA Evidence
- [ ] SCIM provisioning logs show operations in CRA Evidence
Group Management
- [ ] Adding user to assigned group provisions them
- [ ] Removing user from all groups deprovisions them
Part 5: Troubleshooting
SAML SSO Issues
"Invalid SAML Response" Error
Cause: Mismatch between CRA Evidence and JumpCloud configuration
Solutions:
- Verify the ACS URL matches exactly:
https://app.craevidence.com/api/v1/saml/acs - Check there are no trailing slashes
- Ensure the certificate copied to CRA Evidence is complete (includes BEGIN/END lines)
- Verify the certificate has not expired
"Domain Not Configured" Message
Cause: Email domain not linked to an IdP
Solutions:
- Ensure the domain is added in CRA Evidence SSO settings
- Verify the domain is verified (check DNS TXT record)
- Confirm the domain spelling matches exactly (case-sensitive)
User Not Being Created on First Login
Cause: JIT provisioning not enabled or attribute mapping issue
Solutions:
- Confirm JIT Provisioning is enabled for the IdP in CRA Evidence
- Verify the
emailattribute is being sent in the SAML assertion - Check JumpCloud attribute mappings include
email
"Clock Skew" or Timing Errors
Cause: Time difference between JumpCloud and CRA Evidence servers
Solutions:
- Ensure your servers have synchronized time (NTP)
- CRA Evidence allows up to 2 minutes of clock drift by default
SCIM Provisioning Issues
401 Unauthorized
Cause: Invalid or missing Bearer token
Solutions:
- Verify the token in JumpCloud includes
Bearerprefix (with space) - Confirm the token was copied correctly (no extra spaces)
- Check the SCIM client is enabled in CRA Evidence
- If token is lost, rotate it in CRA Evidence and update JumpCloud
429 Too Many Requests
Cause: Rate limit exceeded
Solutions:
- Wait for the rate limit window to reset (1 hour)
- For large initial syncs, contact CRA Evidence support to increase limit
- Check provisioning logs for retry patterns
User Already Exists (409 Conflict)
Cause: User was previously created via different method
Solutions:
- If user exists from SAML JIT, SCIM will link to existing account
- Check external identity mappings in SCIM logs
- Verify
userName(email) matches existing user
User Not Being Provisioned
Cause: Configuration or assignment issue
Solutions:
- Verify the user is assigned to the CRA Evidence application in JumpCloud
- Check SCIM is enabled in JumpCloud Identity Management
- Review provisioning logs in CRA Evidence (Settings > SCIM > Logs)
- Ensure
userNameis a valid email address
Debug Mode
To enable detailed logging for troubleshooting:
- In CRA Evidence, set environment variable:
SAML_DEBUG=true - Check application logs for SAML request/response details
- In JumpCloud, check Directory Insights for provisioning events
Optional: SSO Enforcement
Once you have verified SSO is working correctly, you can require all users to authenticate via JumpCloud:
- In CRA Evidence, go to Settings > Single Sign-On > Enforcement
- Enable Require SSO for all users
- Optionally enable Allow admins to bypass SSO (for emergency access)
- Click Save Settings
Warning: Before enabling enforcement, ensure at least one admin can still log in via password (bypass) in case of IdP issues.
Support
If you encounter issues not covered in this guide:
- Check the SAML SSO Architecture documentation
- Check the SCIM Provisioning Architecture documentation
- Review JumpCloud's SAML documentation
- Contact CRA Evidence support at support@craevidence.com
When contacting support, provide:
- Screenshot of error messages
- JumpCloud application configuration (without secrets)
- CRA Evidence IdP configuration (without certificate)
- SCIM provisioning logs (if applicable)
Help us improve. What was missing or unclear?