JumpCloud doesn’t emit JWT as access token, thus the gateway validates if a client is authenticated performing an http request to the userinfo endpoint (oidc spec).

Requirements

Contact the administrator of the hoop gateway instance to retrieve the API_URL address.

Identity Provider Configuration

1

Create an Application

Login with your account at https://console.jumpcloud.com/

  • Go to SSO and click on the Add New Application button

  • Select Custom OIDC App button on the footer of the page

  • Pick a name, and an optional description

  • In SSO tab

    • Add the Redirect URLs to {APIURL}/api/callback
    • Add the Login URL: to {APIURL}/login
2

Attribute Mapping

  • Still in the SSO tab, select the standard scopes Email and Profile
  • (optional) In the Groups attribute, select include groups attribute and label it https://app.hoop.dev/groups
3

Collect the Credentials

  • Click activate
  • Copy both Client ID and Client Secret

The secret cannot be retrieved later. Make sure you copy and store it now.

4

Collect Issuer Information

The issuer is fixed to https://oauth.id.jumpcloud.com/.

Associating User Groups

To propagate groups to Hoop, create a new group

  • Go to User Groups > Create Group and provide a name and description
  • Go to Users tab and mark the users that you wish to add in this new group
  • Go to Applications tab and mark your custom oidc app
  • Click in Save