Configure JumpCloud as your OpenID Connect (OIDC) Identity Provider to enable seamless and secure authentication for VaultOne users.
Creating a new JumpCloud Custom Application Integration
- Log in to the JumpCloud Admin Portal.
- Go to USER AUTHENTICATION > SSO Applications.
- Click + Add New Application.
- In the the Custom Application tile, click Select.
- Verify your selection by clicking Next.
- Select the Manage Single Sign-On (SSO) and then SSO with OIDC.
- Click Next.
- In the Display Label, type VaultOne. Optionally, you can enter:
- Description - add a description that users will see in their user portal
- User Portal Image - choose Logo or Color Indicator
- Show this application in User Portal - enable to show this application in your organization's user portal
- Click Next and then Configure Application.
Configuring the SSO Integration
To configure JumpCloud
- In the SSO tab, enter the following information:
- Redirect URI - enter the full VaultOne login URL (ex. https://<YOUR-VAULT-NAME>.vault.jumpcloud.com/account/login)
- Client Authentication Type - select Client Secret Post
- Login URL - enter the same login URL you used for Redirect URI.
- Attribute Mapping - select both Email and Profile
- Under USER ATTRIBUTE MAPPINGS, click Add Attribute to add the attributes shown in the image below
- Under CONSTANT ATTRIBUTES, click Add Attribute to add the attributes shown in the image below

- Click Activate.
- Copy the Client ID and Client Secret for the next section.
The Client ID and Secret (token) may only be shown once. Copy them to a secure location, like the JumpCloud Password Manager, for future reference.
To configure VaultOne
- In VaultOne, go to Administration > Settings > Identity Providers.
- In the OpenID Connect Information section, select Enabled and then click + Add.
- Enter the following information:
- Grant Type - select Authorization Code Flow
- Name - enter JumpCloud (or any clear identifier)
- ClientID - paste the JumpCloud Client ID
- Client Secret - paste the JumpCloud Client Secret
- Issuer - enter https://oauth.id.jumpcloud.com/
- Authorization Endpoint - enter https://oauth.id.jumpcloud.com/oauth2/auth
- Authentication Type - select Client Secret Post
- Click Save all.

Signing In to VaultOne with JumpCloud
- Users who have been granted access to VaultOne can now sign in via SSO using their JumpCloud account.
- In the JumpCloud User Portal, the application you configured (for example, “PAM VaultOne”) will appear. Click to sign-in.
- You will be redirected to the VaultOne login page. Click “Sign in with OpenID” to complete authentication.
- On first SSO, the user is automatically created in VaultOne and assigned to the platform’s default role. You can find this under Administration > Roles; the default role defines the user’s permissions.
- If this is the user’s first access and you did not enable the “Activate user by default” option in Administration, the user will be created in an inactive state and must be manually activated by an admin before they can access VaultOne.

Authorizing User SSO Access
Users are implicitly denied access to applications. After you connect an application to JumpCloud, you need to authorize user access to that application. You can authorize user access from the Applications, Users List or User Groups page.
To authorize user access from the Application’s page
- Log in to the JumpCloud Admin Portal.
If your data is stored outside of the US, check which login URL you should be using depending on your region, see JumpCloud Data Centers to learn more.
- Go to Access > SSO Applications, then select the application to which you want to authorize user access.
- Select the User Groups tab. If you need to create a new group of users, see Get Started: User Groups.
- Select the check box next to the desired group of users to which you want to give access.
- Click Save.
To learn how to authorize user access from the Users or User Groups pages, see Authorize Users to an SSO Application.
Validating SSO user authentication workflow(s)
IdP-initiated user workflow
- Access the JumpCloud User Console
- Go to Applications and click an application tile to launch it
- JumpCloud asserts the user's identity to the SP and is authenticated without the user having to log in to the application
SP-initiated user workflow
- Go to the SP application login - generally, there is either a special link or an adaptive username field that detects the user is authenticated through SSO
This varies by SP.
- Login redirects the user to JumpCloud where the user enters their JumpCloud credentials
- After the user is logged in successfully, they are redirected back to the SP and automatically logged in
Removing the SSO Integration
These are steps for removing the integration in JumpCloud. Consult your SP's documentation for any additional steps needed to remove the integration in the SP. Failure to remove the integration successfully for both the SP and JumpCloud may result in users losing access to the application.
To deactivate the SSO Integration
- Log in to the JumpCloud Admin Portal.
- Go to Access > SSO Applications.
- Search for the application that you’d like to deactivate and click to open its details panel.
- Select the SSO tab.
- Scroll to the bottom of the configuration.
- Click Deactivate SSO.
- Click save.
- If successful, you will receive a confirmation message.
To delete the application
- Log in to the JumpCloud Admin Portal.
If your data is stored outside of the US, check which login URL you should be using depending on your region, see JumpCloud Data Centers to learn more.
- Go to Access > SSO Applications.
- Search for the application that you’d like to delete.
- Check the box next to the application to select it.
- Click Delete.
- Enter the number of the applications you are deleting
- Click Delete Application.
- If successful, you will see an application deletion confirmation notification.