Use JumpCloud as your organization's SSO and enable single sign-on in Torq for your workspace.
Important!
Before getting started, make sure you understand how to prevent user lockouts by reviewing this KB article.
Step One: Create an SSO Configuration in JumpCloud
Navigate to JumpCloud: Go to Settings > SSO.
Configure the SSO:
For the IdP Entity ID, enter
JumpCloud.For ACS URLs, enter the login redirect URL applicable to your regional deployment. Use
https://app.torq.io/__/auth/handlerfor the U.S. andhttps://app.eu.torq.io/__/auth/handlerfor the EU.For the signature algorithm, enter
RSA-SHA256.For the default RelayState, enter the login redirect URL applicable to your regional deployment. Use
https://app.torq.io/__/auth/handlerfor the U.S. andhttps://app.eu.torq.io/__/auth/handlerfor the EU.Enter the login URL applicable to your regional deployment. Use
https://app.torq.io/auth/SSOSignInfor the U.S. andhttps://app.eu.torq.io/auth/SSOSignInfor the EU.Select Declare Redirect Endpoint.
Enter
https://sso.jumpcloud.com/saml2/<NAME OF YOUR APP>as the IdP URL.Define the following three user attributes:
Enter
emailfor both the service provider and JumpCloud attribute names.Enter
first_namefor the service provider andfirstnamefor JumpCloud.Enter
last_namefor the service provider andlastnamefor JumpCloud.
Select include group attribute and enter
groups.
Finalize: Click Save and copy the public certificate to save it for later.
Step Two: Create a New SSO Configuration in Torq
Open Torq: Navigate to Settings > SSO Login.
Add an IdP Connection: In the IdP Connection section, click Add.
Configure the Connection:
Select the SAML 2.0 protocol.
Enter
https://sso.jumpcloud.com/saml2/<NAME OF YOUR APP>as the sign-on URL.Enter
JumpCloudas the issuer URL.Paste the public certificate you generated earlier.
Finalize: Click Save.
Step Three: Define SSO Claims Mapping
Claims mapping defines the roles that logged-in enterprise users are assigned in the Torq workspace.
The mappings are interpreted in an ordered, top-down manner. The mapping assigning the highest privilege should be listed first, and the other mappings should be listed in descending privilege order. A user is assigned a role according to the first match, disregarding any following assignments.
Add a Claim: In the Claims mapping section, click Add.
Configure the Claim:
Enter the claim name provided by the IdP. Frequently used claims include
emailfor a particular user orgroups.Enter the expected value for the claim. Claim values are case-sensitive.
Select the Torq role you would like to assign.
Finalize: Click Add.



