# JumpCloud

{% hint style="success" %}
Please complete the steps in the [Admin Console Configuration](https://docs.keeper.io/en/sso-connect-cloud/admin-console-configuration) section first.
{% endhint %}

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FnUyPBgZTMizL72aKTJil%2FJumpCloud.jpg?alt=media&#x26;token=bfe3418a-9973-487e-b321-30a43a1c9390" alt=""><figcaption></figcaption></figure>

### JumpCloud

(1) Log into the JumpCloud Administrator console.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MFC2Vt7VAeE90FPQorf%2F-MFC3MHeEKk-eZjckR-Q%2FJumpcloud_login.PNG?alt=media\&token=a47a05ff-1f5e-465c-b2d5-3a0293589193)

Select the **SSO** tab on the side menu.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MKGjx7W9BIkBkBWnGhA%2F-MKGk_bMPQi2EEE7uuZw%2FJumpCloud_apps.png?alt=media\&token=632bfc94-0e98-4473-8e8f-f4f32e10b38d)

(2) Next, select the **+** icon in the upper left corner.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MKGjx7W9BIkBkBWnGhA%2F-MKGlJHOAOQCww3E9V9u%2FJumpCloud_add_apps.png?alt=media\&token=5b867b8b-feef-409b-b6e8-e6dfe39cf844)

On the "Get Started with SSO Application page, search for **Keeper** in the search bar. Select Configure on the Keeper Application.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MKGjx7W9BIkBkBWnGhA%2F-MKGmHrXXgBRrwwUXU3j%2FJumpCloud_add_keeper.PNG?alt=media\&token=883fcd0e-cdca-438f-87bf-709ad356fed0)

(3) Next, on Keeper Application connector page, General Info section set the Display Label:\
\
**Keeper Security Password Manager**

![JumpCloud General Info](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MF6qXz87_x0Liy5MwqV%2F-MF7N1WfJ-HvQDaWs1FX%2FJumpCloud_general.png?alt=media\&token=8a1b817d-73fe-4e32-ab85-2a9249259861)

On the **Single Sign-On Configuration** area, click the "Upload Metadata" button.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MKGjx7W9BIkBkBWnGhA%2F-MKGnWHmzSm3qvQrR7qt%2FJumpcloud%20Upload%20Metadata.png?alt=media\&token=c8e153ce-3029-416e-9c35-40d7a184474a)

{% hint style="warning" %}
The Keeper metadata is available on the admin console. Go to the provisioning instance -> View -> Export Metadata
{% endhint %}

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MF6qXz87_x0Liy5MwqV%2F-MF6wuzY9HNPfwoC_vLk%2FView.png?alt=media\&token=7bd082f3-56ba-4ede-b3c6-25ff0767cc6d)

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MJ9SEkoq5ho0UydUs-W%2F-MJ9yy_ID4jKU-finPSJ%2FScreenshot%202020-10-08%20at%2018.29.01.png?alt=media\&token=c9465576-1a8d-41de-9863-daaf1a0b58ec)

(4) After the metadata has been uploaded, head back to the JumpCloud SSO configuration page and input the **Login URL** as such **<https://keepersecurity.com/api/rest/sso/ext\\_login/\\><YourSSOIdHere>.**

{% hint style="info" %}
Your SSO ID can be found at the end of your SP Entity ID.\
Ex: <https://keepersecurity.com/api/rest/sso/saml/**459561502469>\*\*
{% endhint %}

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MKGjx7W9BIkBkBWnGhA%2F-MKGwMI5Rf5h5LRDHyoN%2FJumpCloud_LoginURL.png?alt=media\&token=a171a464-261e-4acd-b1d7-9cb14b72c552)

Complete the configuration by scrolling to the bottom of the page and select the **activate** button.

![Activate Keeper on Jumpcloud](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MF7ReVDdGMD3gChtQV0%2F-MF7VWFZFZzQJjlYMxlC%2FJumpCloud_activate.png?alt=media\&token=41f49750-7b28-4996-be02-1d066ef90fbc)

(5) Last step is to export the metadata from this connector to import it into the Keeper SSO Connect Cloud™.

![Export JumpCloud Metadata](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MF7ReVDdGMD3gChtQV0%2F-MF7XfbMf77XudCRidh4%2FJumpCloud_export%20metadata.png?alt=media\&token=7320a736-d639-4d21-a67d-40572402ec1d)

Set the IDP Type to GENERIC and upload this file into the Keeper SSO Connect Cloud™ provisioning interface by dragging and dropping the file into the edit screen:

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MF7ZUtaATBixB9__fzm%2F-MF7_VeXYx2Xg2cYQrgD%2FJumpcloud%20Idp%20Upload.png?alt=media\&token=6ab01207-87e2-467b-a628-64451e688760)

{% hint style="success" %}
Your Keeper SSO Connect setup is now complete!
{% endhint %}

{% hint style="info" %}

#### User Provisioning SSO+SCIM

JumpCloud® supports Automated User and Team Provisioning with SCIM (System for Cross Domain Identity Management) which will update and deactivate Keeper user accounts as changes are made in JumpCloud®. Step-by-Step instructions can be found here, <https://docs.keeper.io/enterprise-guide/user-and-team-provisioning/jumpcloud-provisioning-with-scim>
{% endhint %}

#### Move existing users/initial admin to SSO authentication

Users created in the root node (top level) will need to be migrated to the sub node that the SSO integration was configured on. If users remain in the root node, they will be prompted for the master password when accessing the vault and/or admin console.

{% hint style="warning" %}
An admin can not move themselves to the SSO enabled node. It requires another admin to perform this action.
{% endhint %}

After the user is moved to the SSO enabled node, they need to log into the Keeper vault initially by selecting the "Enterprise SSO" pull down and inputting in the Enterprise Domain configured on the SSO integration. The user may get prompted to confirm by entering in the master password.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FfFPNzWDvSwH48ebLJOeY%2FSSO_Login.png?alt=media&#x26;token=f7bc0249-986d-427d-9746-0e7873ff7840" alt=""><figcaption><p>Initially select 'Enterprise SSO Login'</p></figcaption></figure>

Once the user has authenticated with SSO, they only need to use their email address moving forward to initiate SSO authentication.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FDrVwIHQiMQDtlxeJey0G%2Fvault_Login.PNG?alt=media&#x26;token=2e435451-c23e-41bd-91e2-8ec49a216c16" alt=""><figcaption></figcaption></figure>

They won't have to enter the Enterprise Domain. If typing in the email address and clicking Next does not route the user to the desired SSO, ensure that just-in-time provisioning is enabled in the Keeper SSO configuration and ensure that your email domain is reserved by Keeper. More information regarding routing and domain reservation [can be found here](https://docs.keeper.io/enterprise-guide/domain-reservation).
