Support Center

Single Sign On (SSO) with Sumo Logic

Prerequisites:

Notes:

  • How to configure User authorization.
  • SAML is supported only for Sumo Logic Enterprise accounts.

Configure the JumpCloud SSO Application

  1. Access the JumpCloud Administrator Console at https://console.jumpcloud.com.
  2. Select Applications in the main navigation panel.
  3. Select the + in the upper left, scroll or search for the application in the 'Configure New Application' side panel, the select 'configure'.
  4. You can upload a service provider application's XML metadata file to populate SAML connector attributes for that application. The attributes populated by the metadata file may vary by the application. To apply a metadata file for the application you're connecting, click Upload Metadata. Navigate to the file you want to upload, then click Open. You'll see a confirmation of a successful upload. Be aware that if you upload more than one metadata file, you'll overwrite the attribute values applied in the previously uploaded file.
  5. In the IDP Entity ID field, enter https://YOURDOMAIN.TLD (e.g., https://thebestwidgets.com).
  6. Select Upload IdP Private Key and upload the private.pem file generated according to the above prerequisites.
  7. Select Upload IdP Certificate and upload the cert.pem file generated according to the above prerequisites.
  8. In the ACS URL field, enter https://service.us2.sumologic.com/sumo/saml/consume/CODE (replace CODE with your Sumo Logic code, found in the Sumo Logic Configure SAML 2.0 screen **).
  9. In the field terminating the IdP URL, either leave the default value or enter a plaintext string unique to this connector.
  10. (Optional) In the Display Label field, enter a label that will appear under the Service Provider logo within the JumpCloud User console.
  11. Select Activate.

Configure the Service Provider

  1. Log in to Sumo Logic as an administrator.
  2. Hover over Manage in the top navbar, then select Security from the context menu.
  3. Select the SAML button in the top right.
  4. In the Configuration Name field, enter JumpCloud.
  5. In the Issuer field, match the value you entered for https://YOURDOMAIN.TLD (e.g., https://thebestwidgets.com).
  6. In the Authn Request URL field, enter the same IdP URL that you set in the JumpCloud console (if you did not modify the termination of this URL, then enter the default URL: https://sso.jumpcloud.com/saml2/sumologic)
  7. In the X.509 field, paste the contents of your public certificate file.
  8. In the Email Attribute section, select the Use SAML subject radio button.
  9. (Optional) In the Roles section, select the SP Initiated Login Configuration checkbox.
  10. (Optional) Enter a custom value for the Login Path (this is the URL your employees should use to begin SP-initiated SSO.
  11. (Optional) Select the On Demand provisioning (Optional) checkbox.
  12. In the First Name Attribute field, enter firstname.
  13. In the Last Name Attribute field, enter lastname.
  14. In the On Demand Provisioning Roles field, enter an appropriate value.
  15. If you would like your users to return to the JumpCloud User Console when they log out of Sumo Logic, select the Logout Page checkbox and enter https://console.jumpcloud.com/userconsole in the corresponding textfield.
  16. Select Save.
  17. Select the SAML button in the top right.
  18. Select the JumpCloud configuration.
  19. Copy the value in the Assertion Consumer field (this should be entered as the ACS URL field in JumpCloud).

Validate SSO authentication workflows

IdP Initiated

  • Access the JumpCloud User Console at https://console.jumpcloud.com.
  • Select the Service Provider icon.
  • This should automatically launch and login to the application.

SP Initiated

  • Navigate to your Service Provider application URL.
  • You will be redirected to log in to the JumpCloud User Portal.
  • The browser will be redirected back to the application and be automatically logged in.
 

Last Updated: May 15, 2019 11:00AM MDT

Related Articles
desk-forwarding@jumpcloud.com
https://cdn.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete