JumpCloud SSO with QuFabric Self-Hosted

JumpCloud is a cloud-based directory platform that provides identity, access, and device management. It offers single sign-on (SSO), multi-factor authentication (MFA), and centralized user management.

Add JumpCloud as an external IdP directly in the QuFabric Management Dashboard. This is the simplest approach and recommended for most deployments.

Prerequisites

  • QuFabric self-hosted with embedded IdP enabled
  • JumpCloud account with admin permissions

Step 1: Start Creating OIDC Application in JumpCloud

  1. Navigate to JumpCloud Admin Portal
  2. Click SSO Applications under USER AUTHENTICATION

SSO Applications

  1. Click Add New ApplicationCustom Application

Custom Applications

  1. Confirm Custom application and click Next
  2. Select Manage Single Sign-On (SSO) and check Configure SSO with OIDC

SSO with OIDC

  1. Click Next
  2. Enter Display Label: QuFabric
  3. Click Next
  4. Review and click Configure Application
  5. On the SSO tab, configure:
    • Redirect URIs: https://<your-qufabric-domain>/oauth2/callback (you'll verify this matches exactly in Step 3)
    • Client Authentication Type: Client Secret POST
    • Login URL: https://<your-qufabric-domain>/
  6. Under Attribute Mapping, enable:
    • Email scope
    • Profile scope
  7. Click Save to save the SSO configuration
  8. Click the User Groups tab and select at least one user group that can access QuFabric
  9. Don't click Activate yet — keep this tab open and proceed to Step 2

Step 2: Get Redirect URL from QuFabric

  1. Open a new tab or window and log in to your QuFabric Dashboard
  2. Navigate to SettingsIdentity Providers
  3. Click Add Identity Provider
  4. Fill in the fields:
FieldValue
TypeGeneric OIDC
NameJumpCloud (or your preferred display name)
Client IDFrom JumpCloud application (will fill after Step 3)
Client SecretFrom JumpCloud application (will fill after Step 3)
Issuerhttps://oauth.id.jumpcloud.com/ (must include trailing slash)
  1. Copy the Redirect URL that QuFabric displays (but don't click Add Provider yet)

Copy redirect URL

Step 3: Complete JumpCloud Application Setup

  1. Return to the JumpCloud tab
  2. Click the SSO tab
  3. Under Redirect URIs, verify the redirect URL matches the exact URL you copied from QuFabric (e.g., https://qufabric.hopkins.sh/oauth2/callback). If it doesn't match exactly, update it to match.
  4. Click Save (if you made any changes)

Configure JumpCloud SSO

  1. Click Activate
  2. Note the Client ID and Client Secret — you'll need these for Step 4

Client IDs

Step 4: Complete QuFabric Setup

  1. Return to the QuFabric tab
  2. Fill in the Client ID and Client Secret from Step 3

JumpCloud configuration

  1. Click Add Provider

Step 5: Test the Connection

  1. Log out of QuFabric Dashboard
  2. On the login page, you should see a "JumpCloud" button
  3. Click it and authenticate with your JumpCloud credentials
  4. You should be redirected back to QuFabric and logged in. Unless your user approval setting were changed you will need to log back into your local admin account to approve the user.

Configuring JWT 'groups' Claim

To sync JumpCloud groups with QuFabric, you need to enable the group attribute in your JumpCloud OIDC application.

Step 1: Enable Group Attributes in JumpCloud

  1. In JumpCloud Admin Portal, go to AccessSSO Applications
  2. Select your QuFabric application
  3. Go to the SSO tab
  4. Under Attribute Mapping, find the Group Attributes section
  5. Check Include group attribute
  6. In Groups Attribute Name, enter: groups
  7. Click Save

Add groups claim

Step 2: Assign User Groups to the Application

  1. In your QuFabric application, go to the User Groups tab
  2. Select the groups whose members should have access to QuFabric
  3. Click Save

Users will receive group claims based on which assigned groups they belong to.

Step 3: Enable JWT Group Sync in QuFabric

  1. In QuFabric Dashboard, go to SettingsGroups
  2. Enable JWT group sync
  3. Set JWT claim to groups
  4. Optionally configure JWT allow groups to restrict access

Standalone Setup (Advanced)

Use JumpCloud as your primary identity provider instead of QuFabric's embedded IdP. This option gives you full control over authentication and user management, is recommended for experienced JumpCloud administrators as it also requires additional setup and ongoing maintenance.

For most deployments, the embedded IdP is the simpler choice — it's built into QuFabric, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the Management Setup (Recommended) section above.

For detailed instructions on the standalone setup, see the JumpCloud SSO with QuFabric Self-Hosted (Legacy) documentation.


Troubleshooting

"Connector failed to initialize" error

  • Ensure Attribute Mapping has both Email and Profile scopes enabled
  • Verify at least one User Group is assigned to the application before activation
  • Check that Redirect URIs exactly matches the URL from QuFabric (no trailing slashes)
  • Ensure Client Authentication Type is set to Client Secret POST
  • Verify Login URL matches your QuFabric domain exactly
  • Make sure the application is Activated and you have the correct Client ID and Client Secret
  • Remove any duplicate attributes in Attribute Mapping (e.g., email and email_verified)

"Invalid redirect URI" error

  • Ensure all redirect URIs are configured in JumpCloud
  • Check for trailing slashes
  • Verify URLs match exactly

Users can't access QuFabric

  • Verify the user belongs to an assigned user group
  • Check that the user group is assigned to the QuFabric application