Use JumpCloud as your organization's SSO and enable single sign-on in Torq for your workspace.
Step One: Create an SSO Configuration in JumpCloud
Navigate to JumpCloud: Go to Settings > SSO.
Configure the SSO:
For the IdP Entity ID, enter
JumpCloud
.For ACS URLs, enter the login redirect URL applicable to your regional deployment. Use
https://app.torq.io/__/auth/handler
for the U.S. andhttps://app.eu.torq.io/__/auth/handler
for the EU.For the signature algorithm, enter
RSA-SHA256
.For the default RelayState, enter the login redirect URL applicable to your regional deployment. Use
https://app.torq.io/__/auth/handler
for the U.S. andhttps://app.eu.torq.io/__/auth/handler
for the EU.Enter the login URL applicable to your regional deployment. Use
https://app.torq.io/auth/SSOSignIn
for the U.S. andhttps://app.eu.torq.io/auth/SSOSignIn
for the EU.Select Declare Redirect Endpoint.
Enter
https://sso.jumpcloud.com/saml2/<NAME OF YOUR APP>
as the IdP URL.Define the following three user attributes:
Enter
email
for both the service provider and JumpCloud attribute names.Enter
first_name
for the service provider andfirstname
for JumpCloud.Enter
last_name
for the service provider andlastname
for JumpCloud.
Select include group attribute and enter
groups
.
Finalize: Click Save and copy the public certificate to save it for later.
Step Two: Create a New SSO Configuration in Torq
Open Torq: Navigate to Settings > SSO Login.
Add an IdP Connection: In the IdP Connection section, click Add.
Configure the Connection:
Select the SAML 2.0 protocol.
Enter
https://sso.jumpcloud.com/saml2/<NAME OF YOUR APP>
as the sign-on URL.Enter
JumpCloud
as the issuer URL.Paste the public certificate you generated earlier.
Finalize: Click Save.
Step Three: Define SSO Claims Mapping
Claims mapping defines the roles that logged-in enterprise users are assigned in the Torq workspace.
The mappings are interpreted in an ordered, top-down manner. The mapping assigning the highest privilege should be listed first, and the other mappings should be listed in descending privilege order. A user is assigned a role according to the first match, disregarding any following assignments.
Add a Claim: In the Claims mapping section, click Add.
Configure the Claim:
Enter the claim name provided by the IdP. Frequently used claims include
email
for a particular user orgroups
.Enter the expected value for the claim. Claim values are case-sensitive.
Select the Torq role you would like to assign.
Finalize: Click Add.