[Notification] We're upgrading the JumpCloud Support Center the week of September 30th.

Support Center

Single Sign On (SSO) with GitHub Enterprise



  • After you connect an application to JumpCloud, you can connect it to user groups. Users in the groups you connect can access the application through SAML SSO. Learn how to connect user groups to applications.
  • Please carefully follow the steps to configure GitHub Enterprise SAML. Specifically, note that the checkboxes for idP initiated SSO (disables AuthnRequest) and Disable administrator demotion/promotion. (ignore the administrator attribute) are selected.

Configure the JumpCloud SSO Application

  1. Access the JumpCloud Administrator Console at https://console.jumpcloud.com.
  2. Select Applications in the main navigation panel.
  3. Select the + in the upper left, scroll or search for the application in the 'Configure New Application' side panel, the select 'configure'.
  4. You can upload a service provider application's XML metadata file to populate SAML connector attributes for that application. The attributes populated by the metadata file may vary by the application. To apply a metadata file for the application you're connecting, click Upload Metadata. Navigate to the file you want to upload, then click Open. You'll see a confirmation of a successful upload. Be aware that if you upload more than one metadata file, you'll overwrite the attribute values applied in the previously uploaded file.
  5. In the IDP Entity ID field, enter https://YOURDOMAIN.TLD (e.g., https://thebestwidgets.com).
  6. In the SP Entity ID field, enter https://HOSTNAME (replace HOSTNAME with the hostname of the server on which GitHub Enterprise is hosted. E.g. github.example.com).
  7. In the ACS URL field, enter https://HOSTNAME/saml/consume (replace HOSTNAME with the hostname of the server on which GitHub Enterprise is hosted. E.g. github.example.com).
  8. In the field terminating the IdP URL, either leave the default value or enter a plaintext string unique to this connector.
  9. (Optional) In the Display Label field, enter a label that will appear beside the GitHub Enterprise logo within the JumpCloud console to guide administrators and users to the connection you have configured.
  10. Select Activate.

Configure the Service Provider

  1. Log in to the GitHub Enterprise management console, usually at https://HOSTNAME:8443 (This user's email should also be managed by JumpCloud).
  2. Select Authentication in the lefthand menu.
  3. Select the SAML radio button.
  4. Select the idP initiated SSO (disables AuthnRequest) checkbox.
  5. Select the Disable administrator demotion/promotion. (ignore the administrator attribute) checkbox.
  6. In the Single sign-on URL field, enter the same IdP URL that you set in the JumpCloud console (if you did not modify the termination of this URL, then enter the default URL: https://sso.jumpcloud.com/saml2/github-enterprise).
  7. In the Issuer field, enter the IdP Entity ID you selected in the JumpCloud console.
  8. In the Verification certificate field, paste the contents of your public certificate.
  9. Scroll to the bottom of the page and select Save settings Note: This will cause your GitHub Enterprise server to restart the GitHub service.

Validate SSO authentication workflows

IdP Initiated

  • Access the JumpCloud User Console at https://console.jumpcloud.com.
  • Select the Service Provider icon.
  • This should automatically launch and login to the application.

SP Initiated

  • In your Web browser, navigate to the GitHub Enterprise https://HOSTNAME.
  • If necessary, log into the JumpCloud User Console as the appropriate user.
  • You should automatically be logged in to GitHub Enterprise.

Last Updated: Aug 19, 2019 01:13PM MDT

Related Articles
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found