your database front-end

JumpCloud Single-Sign-on Setup

The following describes how to set up Single-Sign-on in dbFront using JumpCloud (JumpCloud.com).

JumpCloud offers a fully functional 10 users & 10 systems Free Forever license which is ideal for small organizations or IT departments that are experimenting with Single-Sign-on.

Information Collection

When setting up JumpCloud Single-Sign-on you need to collect or decide on the following pieces of information:

  1. Determine a display name for your application. e.g. "dbFront - Records Maintenance"
  2. Determine the root URL for your dbFront install.  This would be something like:
    • https://dbFront.YourCompany.com/dbFront/ (public server with SSL)
    • http://YourServer/dbFront/ (internal server without SSL)
  3. Create a unique application id:  A suggested value is "sp.dbFront.YourCompany.com"
  4. Determine / Create a JumpCloud group for administrators: e.g. "dbFrontAdmins"

JumpCloud Application Setup Steps

  1. Browse to the JumpCloud login page: https://console.jumpcloud.com/login
  2. Click on Administrative Login at the top left of the screen,
  3. The login screen should now say JumpCloud Administrator Login,
  4. Complete the login,
  5. Click on the Application link on the left side menu to view the configured applications,
  6. Click on the big green plus symbol to configure a new application,
  7. A dialog should appear prompting you to search for a known application,
  8. Search for "SAML" which should filter the list to "Custom SAML App / SAML 2.0"

    JumpCloud Add Application

  9. Click on the green  configure  button to set up your new dbFront application,
  10. Adjust the following settings:JumpCloud Settings
    1. Display Label: e.g. "dbFront - Records Maintenance"
    2. IDP Entity Id: This is a JumpCloud internal unique value for your application. A suggested value is: "idp.dbFront.YourCompany.com"
    3. SP Entity Id: This value must match the dbFront Application Id configured in dbFront, the value suggested above was "sp.dbFront.YourCompany.com",
    4. ACS URL: This should match the root URL for your dbFront install, e.g. "https://dbFront.YourCompany.com/dbFront/",
    5. SP Certificate: Leave blank, not yet supported,
    6. Sign Assertion: Check value,
    7. IDP URL: Set to https://sso.jumpcloud.com/saml2/dbFront.  This value must match the JumpCloud Endpoint Url configured in dbFront,
    8. Attributes: Ensure that the JumpCloud "email" and "firstname" attributes are included as "User.Email" and "User.FirstName",
    9. Groups Attributes: Ensure that the group attribute is included with the name "memberOf"
  11. Click  activate  to save the application settings,
  12. After clicking confirm JumpCloud will create and activate the application and generate a Public Certificate,
  13. Download the Public Certificate from the popup notification or by re-entering the application settings.

JumpCloud Groups and Users

Please review the JumpCloud documentation for instructions on creating and assigning users and groups to the dbFront application.

dbFront Application Setup Steps

Once the application is set up in JumpCloud, you can then proceed with the setup in dbFront.

The JumpCloud specific instructions are:

  1. Single-Sign-On Service: Jump Cloud,
  2. dbFront Application Id: sp.dbFront.YourCompany.com,
  3. JumpCloud Endpoint Url: https://sso.jumpcloud.com/saml2/dbFront,
  4. JumpCloud Public Certificate: Open the downloaded certificate as a text file and copy the complete text into this field,
  5. JumpCloud Admin Group: Enter the name of the JumpCloud admin group that should have Admin access to dbFront,
  6. Logout Redirect Url: Enter "https://console.jumpcloud.com/userconsole#"
    This special URL will allow users who log out of dbFront to return to the JumpCloud menu where they can either log-out completely or start another application.

dbFront - Field Preferences

For complete instructions on completing the dbFront Single-Sign-on setup see: Single-Sign-on

Trouble Shooting

For a list of Single-Sign-On issues and answers see: Single-Sign-On Questions

Content you want the user to see goes here.
close