[IMPORTANT] Please note that this site will be disabled on October 31. In it's place, the new JumpCloud Help Center is live! Check it out here!

Support Center

Single Sign On (SSO) with AWS GovCloud (US)


  • A public certificate and private key pair are required to successfully connect applications with JumpCloud. After you activate an application, we automatically generate a public certificate and private key pair for you. You can use this pair or upload your own. 
  • In order to successfully complete the integration between JumpCloud and Amazon AWS GovCloud (via IAM), you must have administrative rights to access configuration settings of the service provider.
  • Your AWS Account number, find this by going to the main AWS console, go to All Services, under Security, Identity & Compliance select IAM. It will be embedded in the IAM users sign-in link: https://YOUR_AWS_ACCOUNT_NUMBER.signin.aws.amazon.com/console.


  • After you connect an application to JumpCloud, you can connect it to user groups. Users in the groups you connect can access the application through SAML SSO. Learn how to connect user groups to applications.
  • Amazon IAM accepts SSO based on roles. Enabling SSO for Amazon AWS (IAM) in this way will allow any user in your organization to access Amazon AWS GovCloud (IAM). Multiple Roles may be defined as detailed below.
  • This connector supports additional Constant Attributes that are sent in the assertion. E.g., Amazon supports SessionDuration in order to allow up to 12 hour sessions before logout. By default, the connector template contains this additional attribute where the Name is https://aws.amazon.com/SAML/Attributes/SessionDuration and the Value in seconds must be between 15 minutes and 12 hours; e.g., for 15 minutes, enter a value of 900.

Configure the JumpCloud SSO Application

  1. Access the JumpCloud Administrator Console at https://console.jumpcloud.com.
  2. Select Applications in the main navigation panel.
  3. Select the + in the upper left, scroll or search for the application in the 'Configure New Application' side panel, the select 'configure'.
  4. You can upload a service provider application's XML metadata file to populate SAML connector attributes for that application. The attributes populated by the metadata file may vary by the application. To apply a metadata file for the application you're connecting, click Upload Metadata. Navigate to the file you want to upload, then click Open. You'll see a confirmation of a successful upload. Be aware that if you upload more than one metadata file, you'll overwrite the attribute values applied in the previously uploaded file.
  5. Configure one or more Roles:
    1. Under Constant Attributes, in the second row containing NAME https://aws.amazon.com/SAML/Attributes/Role, update the Value by replacing YOUR_AWS_ACCOUNT_NUMBER with your actual AWS Account number. This is done twice in the field. You may want to copy/paste it from a text document. arn:aws-us-gov:iam::YOUR_AWS_ACCOUNT_NUMBER:role/ROLE_1,arn:aws-us-gov:iam::YOUR_AWS_ACCOUNT_NUMBER:saml-provider/JumpCloud
    2. Replace ROLE_1 with the role created using the steps under Configure the Service Provider
    3. Create as many role attributes as desired by using the same NAME and a VALUE with a unique role
  6. In the field terminating the IdP URL, either leave the default value or enter a plaintext string unique to this connector.
  7. (Optional) In the Display Label field, enter a label that will appear beside the Amazon Web Services Govcloud IAM logo within the JumpCloud console to guide administrators and users to the connection you have configured.
  8. Select Activate, then Save.
  9. Reopen the connector and select export metadata at the bottom.

Configure the Service Provider

  1. Log in to the Amazon Web Services GovCloud console for your organization as an administrator.
  2. In the main console, go to All Services, under Security, Identity & Compliance select IAM.
  3. On the lefthand sidenav, select on Identity Providers.
  4. Select Create Provider.
  5. In the Provider Type drop-down, select SAML.
  6. In the Provider Name field, enter JumpCloud. If another name is chosen, this string will need to replace JumpCloud in the role attribute value in the JumpCloud configuration.
  7. Select Choose File and upload the metadata file, by default, it will be saved as JumpCloud-awsgov-metadata.xml.
  8. Select Next Step.
  9. On the next screen, select Create.
  10. In the lefthand side-nav, select Roles.
  11. Select Create role.
  12. For Select type of trusted entity, select SAML
  13. For SAML Provider, select the provider created in the steps above.
  14. Select Allow programmatic and AWS Management Console access. Select Next: Permissions.
  15. Attach the desired permission policy for the role. Select Next: Review
  16. Define a Role Name. This string replaces ROLE_1 in the JumpCloud configuration
  17. Select Create role.

Validate SSO authentication workflows

IdP Initiated

  • Access the JumpCloud User Console at https://console.jumpcloud.com.
  • Select the Service Provider icon.
  • This should automatically launch and login to the application.

SP Initiated

  • Navigate to your Service Provider application URL.
  • You will be redirected to log in to the JumpCloud User Portal.
  • The browser will be redirected back to the application and be automatically logged in.

Last Updated: Aug 19, 2019 01:53PM MDT

Related Articles
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found