Identity Providers
JumpCloud
JumpCloud doesn’t emit JWT as access token, thus the gateway validates if a client is authenticated performing an http request to the userinfo endpoint (oidc spec).
Requirements
- An admin account in JumpCloud
API_URL
is the public DNS name of the hoop gateway instance
Contact the administrator of the hoop gateway instance to retrieve the API_URL
address.
Identity Provider Configuration
1
Create an Application
Login with your account at https://console.jumpcloud.com/
-
Go to SSO and click on the Add New Application button
-
Select Custom OIDC App button on the footer of the page
-
Pick a name, and an optional description
-
In SSO tab
- Add the Redirect URLs to
{APIURL}/api/callback
- Add the Login URL: to
{APIURL}/login
- Add the Redirect URLs to
2
Attribute Mapping
- Still in the SSO tab, select the standard scopes
Email
andProfile
- (optional) In the Groups attribute, select include groups attribute and label it https://app.hoop.dev/groups
3
Collect the Credentials
- Click activate
- Copy both Client ID and Client Secret
The secret cannot be retrieved later. Make sure you copy and store it now.
4
Collect Issuer Information
The issuer is fixed to https://oauth.id.jumpcloud.com/
.
Associating User Groups
To propagate groups to Hoop, create a new group
- Go to User Groups > Create Group and provide a name and description
- Go to Users tab and mark the users that you wish to add in this new group
- Go to Applications tab and mark your custom oidc app
- Click in Save