{"id":75878,"date":"2023-05-23T12:06:33","date_gmt":"2023-05-23T16:06:33","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75878"},"modified":"2025-01-28T14:29:34","modified_gmt":"2025-01-28T19:29:34","slug":"delete-org","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/delete-org","title":{"rendered":"Delete an Organization"},"content":{"rendered":"\n
Learn about the requirements and considerations for deleting your org from JumpCloud.<\/p>\n\n\n\n
<\/p><\/div>
Prerequisites<\/strong>:<\/p>\n\n\n\n Before sending in your Org Delete request, follow these steps to ensure that the removal from JumpCloud goes smoothly. If you don’t follow these steps in proper order, your users or resources may have potential issues with access. <\/p>\n\n\n\n JumpCloud requires all devices to be removed before an Org Deletion request is processed. If you’re using JumpCloud to manage devices, follow these steps:<\/p>\n\n\n\n Deleting Devices in JumpCloud will uninstall the JumpCloud agent from all of your devices. The user, the user’s password, local files and profile data, and device policies will remain on the device after the JumpCloud Agent is uninstalled. <\/p>\n\n\n\n If you have configured networking devices like WiFi or VPNs to authenticate using JumpCloud’s RADIUS-as-a-Service, you should first change the networking device’s configuration to point to either local authentication or another RADIUS Server not managed by JumpCloud. If you’re using JumpCloud’s RADIUS-as-a-Service, follow the steps below: <\/p>\n\n\n\n By reconfiguring the Networking device to point to local authentication or another RADIUS Server, you are ensuring that users will have a method to authenticate to the network after your Jumpcloud Org Delete request has been processed. <\/p>\n\n\n\n If you have configured applications or resources, like NAS, to authenticate using JumpCloud’s LDAP-as-a-Service, you should first change the resource’s configuration to point to either local authentication or another LDAP Server not managed by JumpCloud. If you’re using JumpCloud’s LDAP-as-a-Service, reconfigure your LDAP-enabled resource to either use local authentication or <\/strong><\/em>reconfigure the device to point to another LDAP server not managed by JumpCloud. <\/p>\n\n\n\n By reconfiguring the LDAP-enabled resource to point to local authentication or another LDAP Server, you’re ensuring that users will have a method to authenticate to the resource after your Jumpcloud Org Delete request has been processed. <\/p>\n\n\n\n If you have configured SSO apps, like Salesforce or Slack, to authenticate using JumpCloud, you should change the app’s configuration to either have the app handle authentication requests or repoint the SSO app to another SSO Identity Provider first. If you’re using JumpCloud as an Identity Provider for SSO apps, follow these steps: <\/p>\n\n\n\n By reconfiguring the SSO app device to point to itself for authentication or another SSO Identity Provider, you’re ensuring that users have a method to authenticate to the applications after your Jumpcloud Org Delete request has been processed.<\/p>\n\n\n\n If you have configured Cloud Directory Integrations like Google Workspace Sync, you should deactivate them before proceeding with the organization deletion request. To deactivate a Cloud Directory Integration:<\/p>\n\n\n\n\n
Considerations<\/strong>:<\/p>\n\n\n\n\n
Sending a Deletion Request<\/h2>\n\n\n\n
Deleting Devices<\/h2>\n\n\n\n
\n
Removing RADIUS Networks<\/h2>\n\n\n\n
\n
Reconfiguring LDAP Authentication<\/h2>\n\n\n\n
Removing SSO Applications<\/h2>\n\n\n\n
\n
Deactivating Cloud Directory Integrations <\/h2>\n\n\n\n