You can choose to enforce SAML SSO for Ally.io with Jumpcloud for added security. Once set up, users in your organization can use their managed Jumpcloud account credentials to sign in to Ally.io via Single Sign-On (SSO).

In this Article:

  • Connect Ally.io to Jumpcloud
  • Configuration

Connect Ally.io to Jumpcloud

To connect your SSO to your instance of Ally.io, please follow the instructions listed here: Steps to setup SSO

After you have enabled SSO within Ally.io, the next step is to create an Ally.io App within Jumpcloud:

  1. Login to Jumpcloud as an Admin
  2. Select "Applications" and "Configure New Application" (Green plus sign)
  3. Select "Custom SAML App"

Configuration

Enter the following information into the configuration fields:

General Info:

  1. Display Label: Ally.io (Or other name you would like to appear for the app)
  2. Description: Optional- brief summary of what the app is
  3. Display Option: Select a logo file or a color indicator to represent the app

Single Sign-On Configuration:

  1. IDP Entity ID: Copy the SAML name from Ally.io
  2. SP Entity ID: Copy the SAML name from Ally.io
  3. ACS URL: Copy the SAML name from Ally.io
  4. SP Certificate: Leave as default (Empty)
  5. SAML Subject NameID: email
  6. SAML Subject NameID Format: Leave as default
  7. Signature Algorithm: Leave as default
  8. Sign Assertion: Check this box
  9. Default RelayState: Leave as default
  10. IdP-Initiated URL: Leave as default
  11. Declare Redirect Endpoint: Check this box
  12. IDP URL: Leave as default
  13. Attributes: Case sensitive

Once all fields have been filled out, select "save."

Update the following fields in the Ally.io SSO Integration by copying them from Jumpcloud:

  • SAML 2.0 Endpoint URL: IDP URL
  • Identity Provider Issuer URL: IDP Entity ID
  • Public (X.509) Certificate: IDP Certificate Valid

Did this answer your question?