Skip to main content

JumpCloud SSO

Set up JumpCloud as your identity provider for Willow.

Prerequisites

  • An active JumpCloud account with administrative privileges
  • A Willow account with administrative access

Supported features

SSO Features

  • SP-initiated SSO (OIDC, Authorization Code flow)

SCIM Features

  • Import Users
  • Create Users
  • Update User Attributes
  • Deactivate Users
  • Group Management (create, update, delete groups and group memberships)

Configuration steps

Configure SSO

  1. In the JumpCloud Admin Portal, go to User AuthenticationSSO Applications

  2. Click + Add New Application

  3. In the search box, type OIDC, select the Custom OIDC App template, and click Next

  4. Under General Info, fill in:

    • Display Label: Enter a name for your app (recommended: "Willow")
    • Optionally set a description and user portal image
  5. Click Configure Application, then open the SSO tab

  6. Configure the following settings:

    • Grant Types: Leave Authorization Code checked (default)
    • Redirect URIs: Enter your Willow callback URL
      • For SaaS deployments: https://{your-willow-org}.mcp-s.com/api/auth/callback/jumpcloud
      • For On-Premise deployments: {your-connect-url}/api/auth/callback/jumpcloud
    • Client Authentication Type: Select Client Secret Basic
    • Login URL: Enter your Willow dashboard URL (used for SP-initiated sign-in)
      • For SaaS deployments: https://{your-willow-org}.mcp-s.com
      • For On-Premise deployments: {your-connect-url}

    JumpCloud Settings

  7. Under Attribute Mapping, ensure the Email and Profile standard scopes are selected

    JumpCloud Attributes

  8. Click Activate. JumpCloud will display the Client ID and Client Secret — copy both immediately, as the secret cannot be retrieved later

  9. Open a new browser tab and go to your Willow Admin Console at https://app.withwillow.ai/admin/settings

  10. Navigate to Authentication and select Provider: JumpCloud

  11. Enter the following values:

    • Client ID: Paste the Client ID from step 8
    • Client Secret: Paste the Client Secret from step 8
  12. Click Save Changes

Your SSO configuration is now complete.

Assign users or groups

  1. Return to the JumpCloud Admin Portal and open the Willow application
  2. Open the User Groups tab (or the Users tab to assign individual users)
  3. Select the user groups or users who should have access to Willow
  4. Click Save

SP-initiated SSO

Users can sign in to Willow by starting from the Willow dashboard:

  1. Navigate to your Willow dashboard at https://{your-willow-org}.mcp-s.com
  2. You'll be redirected to JumpCloud to authenticate
  3. Enter your JumpCloud credentials (if not already signed in to JumpCloud)
  4. After successful authentication, you'll be redirected back to the Willow dashboard

Configure SCIM provisioning

If you want to automatically provision and manage users from JumpCloud to Willow, follow these steps.

Generate API token in Willow

  1. In your Willow Admin Console, navigate to https://app.withwillow.ai/admin/api-tokens

  2. Click Generate Token

  3. Enter a descriptive name for the token (for example, "JumpCloud SCIM")

  4. Click Generate

  5. Copy the API Token (it starts with wxt_...)

    Important: Save this token securely. You won't be able to see it again.

Create a placeholder user in Willow

JumpCloud requires a Test User Email to validate the SCIM connection during activation. The email must not already exist in Willow.

Pick an email you have not yet invited to Willow (for example, [email protected]). JumpCloud will create this user as part of the activation handshake.

Configure SCIM in JumpCloud

  1. Return to the JumpCloud Admin Portal and open the Willow application you created earlier
  2. Open the Identity Management tab
  3. Fill in the configuration settings:
    • Base URL:
      • For SaaS deployments: https://app.withwillow.ai/scim/v2
      • For On-Premise deployments: {your-app-url}/scim/v2
    • Token Key: Paste the API token from the previous step (starts with wxt_...)
    • Test User Email: The placeholder email from the previous section
  4. Make sure Enable management of User Groups and Group Membership in this application is on if you want to push groups to Willow
  5. Click Activate

JumpCloud will run a connection test (GET /Users) followed by a series of provisioning tests (create user, and if group management is enabled, add/get/update/delete group). If everything succeeds, you'll see "Identity Management integration has been successfully verified".

If the test fails, JumpCloud displays the upstream error above the Activate button. Review the message and correct the Base URL, token, or test user email before retrying.

Attribute mapping

The default JumpCloud attribute mappings are compatible with Willow's SCIM implementation out of the box. Willow accepts the following SCIM attributes from JumpCloud:

JumpCloud attributeSCIM attribute sent to Willow
emailuserName
firstnamename.givenName
lastnamename.familyName
emailemails[0].value
displayname (or computed)displayName

User activation/deactivation is handled by JumpCloud automatically (the active SCIM attribute) — no mapping changes are required. You only need to customize attribute mappings if you store user identity data in non-default JumpCloud fields.

Your SCIM provisioning is now configured. New users assigned to the Willow app in JumpCloud will be automatically created in Willow, and changes to user attributes or group memberships will be synchronized automatically.

Contact support

If you continue to experience issues, contact Willow support at [email protected] with the following information:

  • Your JumpCloud organization domain
  • The error message or behavior you're experiencing
  • Screenshots of your configuration (with sensitive information redacted)

JumpCloud reference docs: