This article explains how to integrate JumpCloud with Vome using SAML-based Single Sign-On (SSO). It covers the full setup process, from creating a custom SAML application in JumpCloud to configuring the necessary fields between JumpCloud and Vome. This guide is intended for system administrators managing SSO within their organizations.
Integrating JumpCloud with Vome allows your organization to manage admin authentication centrally through your existing identity provider. Once configured, administrators can log in to Vome using their JumpCloud credentials, without needing a separate Vome password.
JumpCloud SSO in Vome is SAML-based and covers admin authentication only. User provisioning and directory sync from JumpCloud are not currently supported.
Note: Admins must already exist in Vome before they can sign in using JumpCloud SSO. If the email returned by JumpCloud does not match an existing Vome admin account, login will fail.
Before you begin, ensure you have:
Before configuring JumpCloud, you will need two values generated by Vome.
You will enter both of these into JumpCloud in the next step.
Inside your new JumpCloud SAML application, enter the following:
https://sso.jumpcloud.com/saml2/[your-sso-name]. Copy this value, as you will need it when completing setup in Vome.Save the application once all fields are filled in.
Note: The IdP Entity ID must be a real issuer URL generated by JumpCloud. It should not be the same as the Vome SP Entity ID. If your exported metadata still shows the placeholder text "IdP Entity ID," you need to save the application in JumpCloud first and then export fresh metadata.
If your configuration also requires a signing certificate, download that separately.
For admins to authenticate through JumpCloud, they must be assigned to the JumpCloud SAML application.
If a user is not assigned to the application in JumpCloud, they will see an access error when attempting to log in.
Note: SSO enforcement is optional. You can enable Enforce SSO to require all admins to authenticate through JumpCloud, or leave it off to allow both login methods. You can also exclude specific admins from enforcement if needed.
Metadata still contains "IdP Entity ID" as a placeholder
This means the JumpCloud app was not fully saved before the metadata was exported. Go back into JumpCloud, save the application, and download a fresh copy of the metadata. Upload the updated file in Vome.
"User not assigned to this application" error in JumpCloud
The admin attempting to log in has not been assigned to the JumpCloud SAML application. Assign the user or their group in JumpCloud and try again.
Login fails after JumpCloud authentication
This usually means the email returned by JumpCloud does not match an existing admin account in Vome. Confirm that the admin exists in Vome and that JumpCloud is returning the correct email address through NameID or a mapped email attribute.
Verification or callback signature errors
This is typically caused by stale metadata or an incorrect signing configuration. In JumpCloud, confirm that signing is set to Assertion and Response, save the application, export fresh metadata, and re-upload it in Vome.
The current JumpCloud integration covers admin authentication only. The following are not currently supported:
Admins must be created in Vome before they can authenticate using JumpCloud SSO.