You have a fleet of Ubiquiti access points lighting up your offices, a cloud directory in JumpCloud handling who’s who, and an audit team breathing down your neck for clean access logs. Everything’s wireless except your stress. Let’s fix that.
JumpCloud and Ubiquiti were made for each other, even if they pretend otherwise. JumpCloud is an open directory platform that centralizes identity management and authentication, supporting LDAP, RADIUS, and SSO across your stack. Ubiquiti’s UniFi line, especially its network controllers and gateways, powers frictionless Wi-Fi and edge routing. When paired, JumpCloud controls who can join and Ubiquiti enforces how.
Here’s the short version: JumpCloud’s RADIUS-as-a-Service connects directly to UniFi’s RADIUS settings. Each user authenticates with their JumpCloud credentials instead of a random WPA password. You get per-user identities instead of a shared network key, instant offboarding, and logs that actually make compliance people smile.
How to connect JumpCloud and Ubiquiti
In UniFi Network, open the RADIUS configuration and set the hostname to JumpCloud’s public RADIUS endpoint. Add your JumpCloud RADIUS secret, match ports (1812/1813), and pick the authentication method (usually PEAP-MSCHAPv2). In JumpCloud, enable RADIUS for the users or groups who need Wi-Fi access. That is all the plumbing you need. Once connected, each login is routed through JumpCloud’s authentication pipeline, enforcing MFA, password policy, and identity-level auditing.
Common setup hiccups
If authentication feels sluggish, check your firewall logs for port blocking. Watch out for mismatched shared secrets between JumpCloud and the UniFi console. Also, ensure that your UniFi controller’s time syncs with an NTP source. A few seconds of clock drift can break RADIUS handshakes faster than any misconfiguration.