Integrate an existing Identity Provider (IdP) with JumpCloud to allow users to securely authenticate using their IdP credentials to gain access to their managed resources.<\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n
Considerations<\/strong><\/p>\n\n\n\n
To prepare your connection:<\/strong><\/p>\n\n\n\n
https:\/\/login.jumpcloud.com\/oauth\/callback<\/code><\/li>\n\n\n\n
For Sign-out redirect URIs<\/strong>, click the \u2018X<\/strong>\u2019 next to the link to clear it. <\/li>\n\n\n\n
Under Assignments<\/strong>, select Allow everyone in your organization to access<\/strong>, unless you only want this applicable to certain groups, in which case select Limit access to selected groups<\/strong> and then enter the groups you want and click Save<\/strong>. <\/li>\n\n\n\n
If you Allow everyone in your org to access, another option will appear under Enable immediate access (Recommended)<\/strong>. Select Enable immediate access with Federation Broker Mode<\/strong> to require users to authenticate through JumpCloud.<\/li>\n\n\n\n
Click Save<\/strong>. <\/li>\n\n\n\n
On the next page, you can manage your app. <\/li>\n<\/ol>\n\n\n\nNow you have a connection to JumpCloud in Okta. Next, you\u2019ll want to configure the connection in JumpCloud. <\/p>\n\n\n\n
To configure Okta:<\/strong><\/p>\n\n\n\n
To manage the IdP:<\/strong><\/p>\n\n\n\n
See Provision New Users on Device Login<\/a> and Automated Device Enrollment<\/a> to learn more.<\/p>\n\n\n\n
To delete the IdP:<\/strong><\/p>\n\n\n\n
Additional Resources:<\/strong><\/p>\n\n\n\n
Walk through a guided simulation for Configuring Okta as an Identity Provider<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"