Extending Active Directory (AD) to the Cloud is even simpler using the delegated authentication capabilities of the JumpCloud Active Directory Integration (ADI).<\/p>\n\n\n\n
What is Delegated Authentication?<\/strong><\/p>\n\n\n\n
Delegated Authentication uses an external source, like AD, to verify a user\u2019s password. Delegated authentication is different from federated user authentication in 2 key ways:<\/p>\n\n\n\n
Why Delegate User Authentication to AD?<\/strong><\/p>\n\n\n\n
There are several use cases for which delegated user authentication is required or preferred:<\/p>\n\n\n\n
Important Considerations<\/strong><\/p>\n\n\n\n
<\/p><\/div>
When upgrading from AD import agent v2.6.0 or lower, you must select Install New Agent<\/strong> from the Downloads dropdown menu in the ADI Details page to get the connect key, which is required to complete the upgrade of the agent on the AD server.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
All installed import agents should be the same version to avoid unexpected behavior or the potential for users not being able to log in if the primary agent is switched.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
When upgrading the AD import agent to version 3.0, existing users connected to the domain will not have their log in delegated to AD unless the Delegated Authority<\/strong> is manually set to Active Directory<\/strong> for those existing users.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
<\/p><\/div>
On devices, with the configuration above, only the password used during the password reset flow is delegated to AD for validation. The user must set and use a local password or PIN for device logins. Their device login credentials will be managed separately.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
<\/p><\/div>
Do the following before disabling the ADI delegated authentication setting, Delegate Password Validation<\/strong>, or disconnecting a user from a delegation-enabled AD domain in the JumpCloud Admin Portal:<\/p>\n\n\n\n
To configure delegated authentication to AD, the main steps you will take are outlined below:<\/p>\n\n\n\n
<\/p><\/div>
The setting for delegated authentication on the ADI configuration is labeled Delegated Password Validation<\/strong>. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
All new users imported from AD to JumpCloud will automatically have their Delegated Authority<\/strong> set to Active Directory.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
Users imported prior to the release of Import Agent v3.0 will continue to use the password stored in JumpCloud, unless the Delegated Authority<\/strong> is manually set to Active Directory. If the import agent is installed on a DC, the password will continue to sync to JumpCloud.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
curl –request POST \\
–url https:\/\/console.jumpcloud.com\/api\/v2\/activedirectories \\
–header ‘content-type: application\/json’ \\
–header ‘x-api-key: REPLACE_KEY_VALUE’ \\
–header ‘x-org-id: REPLACE_ORG_VALUE’ \\
–data ‘{“delegationState”:”ENABLED”,”domain”:”string”,”groupsEnabled”:true,”useCase”:”TWOWAYSYNC”}’<\/p>\n<\/div><\/div>\n\n\n\n
<\/p><\/div>
Users may not be able to log in after this change is made. Changing the delegated authentication setting via the API does not automatically update the Delegated Authority<\/strong> for users connected to the ADI AD domain. You must update that setting manually for each connected (bound) user. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
Replace {id}<\/kbd> with the ID of your ADI instance.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
curl –request PATCH \\
–url https:\/\/console.jumpcloud.com\/api\/v2\/activedirectories\/{id} \\
–header ‘content-type: application\/json’ \\
–header ‘x-api-key: REPLACE_KEY_VALUE’ \\
–header ‘x-org-id: REPLACE_ORG_VALUE’ \\
–data ‘{“delegationState”:”ENABLED”,”domain”:”string”,”groupsEnabled”:true,”useCase”:”TWOWAYSYNC”}’<\/p>\n<\/div><\/div>\n\n\n\n
These steps are intended for users who are already connected (bound) to a delegation-enabled AD domain but do not have their Delegated Authority<\/strong> set to Active Directory<\/strong>.<\/p>\n\n\n\n
<\/p><\/div>
Users will NOT<\/strong> be able to log in to the JumpCloud User Portal or SSO apps if any of the following are true when their Delegation Authority<\/strong> is set to Active Directory<\/strong>:<\/p>\n\n\n\n
Considerations<\/strong><\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n
curl –location –request PUT ‘https:\/\/console.jumpcloud.com\/api\/systemusers\/(id}’ \\
–header ‘Content-Type: application\/json’ \\
–header ‘x-api-key: REPLACE_KEY_VALUE’ \\
–header ‘x-org-id: REPLACE_ORG_VALUE’ \\
–data ‘{
delegatedAuthority”:{“name”: “ActiveDirectory”}
}’<\/p>\n<\/div><\/div>\n\n\n\n
‘https:\/\/console.jumpcloud.com\/api\/systemusers\/{id}?fullValidationDetails=SOME_STRING_VALUE’ -Method PUT -Headers $headers -ContentType ‘application\/json’ -Body ‘{“delegatedAuthority”:{“name”: “ActiveDirectory”}’<\/p>\n<\/div><\/div>\n\n\n\n
<\/p><\/div>
Replace {id}<\/kbd> with the ID of your ADI instance.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n