{"id":110530,"date":"2024-05-17T17:36:13","date_gmt":"2024-05-17T21:36:13","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=110530"},"modified":"2024-07-22T16:55:17","modified_gmt":"2024-07-22T20:55:17","slug":"integrate-with-exium","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/integrate-with-exium","title":{"rendered":"Integrate with Exium"},"content":{"rendered":"\n
Use JumpCloud SAML Single Sign On (SSO) to give your users convenient but secure access to all their web applications with a single set of credentials. Automatically provision, update and deprovision users in Exium from JumpCloud using the Identity Management (SCIM) integration. Leverage this integration to centralize user lifecycle, user identity, and group management in JumpCloud for Exium. Save time and avoid mistakes, as well as potential security risks, related to manually creating users.<\/p>\n\n\n\n
Read this article to learn how to integrate with Exium. <\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n Important Considerations<\/strong><\/p>\n\n\n\n Attribute Considerations<\/strong><\/p>\n\n\n\n <\/p><\/div> If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL<\/strong> field.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> The SSO IdP URL<\/strong> is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> Metadata can also be downloaded from the Configured Applications<\/strong> list. Search for and select the application in the list and then click Export Metadata<\/strong> in the top right corner of the window.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Users are implicitly denied access to applications. After you connect an application to JumpCloud, you need to authorize user access to that application. You can authorize user access from the Application Configuration<\/strong> panel or from the Groups Configuration<\/strong> panel. <\/p>\n\n\n\n To learn how to authorize user access from the Groups Configuration<\/strong> panel, see Authorize Users to an SSO Application<\/a>.<\/p>\n\n\n\n <\/p><\/div> The Client ID and Secret (token) may only be shown once. Copy them to a secure location, like the JumpCloud Password Manager<\/a>, for future reference.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n The following table lists attributes that JumpCloud sends to the application. See Attribute Considerations<\/a> for more information regarding attribute mapping considerations. <\/p>\n\n\n\n\n
\n
\n
\n
Creating a new JumpCloud Application Integration<\/strong><\/h2>\n\n\n\n
\n
\n
\n
\n
Configuring the SSO Integration<\/strong><\/h2>\n\n\n\n
To configure JumpCloud<\/strong> 1<\/strong><\/h3>\n\n\n\n
\n
Download the JumpCloud metadata<\/strong> file<\/strong><\/h4>\n\n\n\n
\n
To configure Exium<\/strong><\/h3>\n\n\n\n
\n
To configure JumpCloud 2<\/strong><\/h3>\n\n\n\n
\n
\n
Authorizing User SSO Access<\/strong><\/h2>\n\n\n\n
To authorize user access from the Application Configuration panel<\/strong><\/h3>\n\n\n\n
\n
Validating SSO authentication workflow(s)<\/strong><\/h2>\n\n\n\n
SP-initiated<\/strong><\/h3>\n\n\n\n
\n
Configuring the Identity Management Integration<\/strong><\/h2>\n\n\n\n
To configure Exium<\/strong><\/h3>\n\n\n\n
\n
To configure JumpCloud<\/strong><\/h3>\n\n\n\n
\n
Attribute Mappings<\/strong><\/h2>\n\n\n\n