Skip to Content

Integrate Jumpcloud SSO with Ezeelogin

Configure Jumpcloud SSO SAML-based Authentication in Ezeelogin GUI.


Overview: This article provides a brief guide to configuring Jumpcloud SSO SAML-based authentication in Ezeelogin GUI, covering application setup, metadata configuration, and user authentication.


SAML is an authentication mechanism for web applications. It's based on web protocols and it cannot be used for user authentication over SSH.


Step 1: Log in to JumpCloud Admin Portal: Navigate to https://console.jumpcloud.com.

Add a New ApplicationGo to User Authentication > SSO Applications. And Click > + Add New Application.

Step 2: Search for SAML 2.0 and select it. Provide a Display Label (e.g., "Ezeelogin SSO") and Save Application.

Step 3: Click on > Configure Application: In the SSO tab, enter IdP Entity ID - Entity ID , SP Entity ID - Entity ID , ACS (Consumer) URL - Assertion Consumer Service URL the following details from Gateway server under Settings > SAML.

Step 4: Copy Metadata URL and paste in Gateway server under Settings > SAML. Paste the URL in Metadata URL and click on Fetch and Save it.

Step 5: Select the user group tab from the left panel, add the user group name, and save it.

Step 6: Add the user by selecting the users tab.

Step 7: Select the SSO applications from left panel and assign the user group to that application.

Step 8: Change Web panel Authentication to SAML from Ezeelogin GUI > Settings > General >Authentication.

Step 9: Enable Auto Create User from Ezeelogin GUI -> Settings -> General -> Security -> Enable Auto Create User

Step 10: Login to Ezeelogin GUI with SAML authentication.
Step 11: After logging into GUI, you need to reset the password and security code of the SAML user under Account --> Password in order to SSH to Ezsh shell.

Step 12: You can log in to Ezeelogin shell via Webssh shell or using any SSH client such as Putty or terminal etc.

WebSSH: Click on the 'Open Web SSH Console' icon to SSH via the browser

WebSSH terminal will open like below. Users can navigate the server group with the Up and Down arrow buttons and enter to login into the server.

Native SSH Client: After resetting the password and security code you can SSH to the Ezsh shell (using Terminal or Putty) with the SAML username.

Step 13: If you are SSH ing with 2FA  enabled using Putty or Terminal it would prompt you to enter the 2FA codes, The 2FA step can be disabled for SAML Authentication under Settings > Two Factor Authentication> Skip Two Factor Authentication for SAML. The user will be able to ssh without being prompted for the 2FA codes only if the user is logged into the web panel, otherwise, if the user is not logged into the web panel it would prompt for the 2FA codes.


How to map Jumpcloud users to the same user group in Ezeelogin? 
Step 1: Under SSO Application --> Choose the application --> Click on SSO --> enable the group attributes (memberOf) and Save it.

Step 2: Also, mention the same group attribute in Ezeelogin GUI --> under Settings --> SAML --> Group Attribute.

Step 3: Try to login as Jumpcloud user.

We recommend using the web ssh shell when you are using SAML authentication, which is a lot more convenient as you would not have to worry about the SSH password or the security code for the users.

  • Add a different email address for each user. By default, Ezeelogin uses email addresses for creating users.
  • If you want to add an existing user in Ezeelogin to SSO, Add the user with the exact username, and email address as follows. (Ezeelogin will verify with the email address of the users by default). Make sure to add the email address for the Ezeelogin Administrator user.
  • Saml authentication is not supported for slaves if the URL is IP-based. If you want to authenticate slave using saml you have to use the domain name.

Related Articles:

Login as superadmin when SSO is enabled globally