Overview
This guide walks you through setting up SAML (Security Assertion Markup Language) authentication between JumpCloud and SigNoz.
What you'll accomplish:
- Configure JumpCloud as an identity provider (IdP) for SigNoz
- Enable your team to access SigNoz using their existing JumpCloud accounts
Prerequisites
Before starting, ensure you have:
- JumpCloud account with administrative access
- SigNoz account (Cloud or Self-Hosted with License) with administrative access
- Your SigNoz instance URL (e.g.,
https://signoz.example.com
)
Configuration Steps
Step 1: Create SAML Application in JumpCloud
- Log in to your JumpCloud admin console
- Navigate to SSO > Applications
- Click + Add New Application
- Select SAML as the application type
Step 2: Configure Entity ID and URLs
In the SAML application configuration:
Entity ID: Enter your SigNoz instance URL (e.g.,
https://signoz.example.com
)ACS URL: Enter your SigNoz instance URL with the redirect path
/api/v1/complete/saml
appended to it (e.g.,https://signoz.example.com/api/v1/complete/saml
)

Step 3: Configure Additional Settings
Ensure the following settings match the configuration shown in the image below:

Step 4: Save Configuration
Click the Save button to create your SAML application.
Step 5: Export Metadata
- After saving, locate the Export Metadata button (usually at the top of the configuration page)
- Click Export Metadata to download the XML metadata file
- Save this file - you'll need it for the next step
The metadata file contains important configuration details like:
- JumpCloud's signing certificate
- Single Sign-On service URLs
- Entity identifiers
Example metadata file structure:
<?xml version="1.0" encoding="UTF-8"?>
<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="<entity-id>">
<md:IDPSSODescriptor WantAuthnRequestsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<md:KeyDescriptor use="signing">
<ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:X509Data>
<ds:X509Certificate>some-certificate-data</ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</md:KeyDescriptor>
<md:NameIDFormat>urn:oasis:names:tc:SAML:1.0:nameid-format:unspecified</md:NameIDFormat>
<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="<idp-url>"/>
<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="<idp-url>"/>
</md:IDPSSODescriptor>
</md:EntityDescriptor>
Step 6: Configure SigNoz for SAML Authentication
Now you'll configure SigNoz to accept authentication from JumpCloud:
Navigate to SigNoz Settings:
- Go to your SigNoz dashboard
- Click on Settings in the left sidebar
- Navigate to Members & SSO
- Click on Authenticated Domains
Add New Domain:
- Click Add Domain
- Select SAML as the authentication method
Enter Configuration Details:
Domain: example.com SAML ACS URL/SAML IDP URL: <idp-url> SAML X.509 Certificate: <some-certificate-data> SAML Entity ID: <entity-id> Skip AuthN Requests Signed: True
Where to find these values:
- Domain: The email domain for users who should use SSO (e.g.,
example.com
for users with@example.com
emails) - SAML IDP URL: Found in the metadata file under
<md:SingleSignOnService Location="...">
- SAML X.509 Certificate: The certificate content from the metadata file (between
<ds:X509Certificate>
tags) - SAML Entity ID: The
entityID
value from the metadata file
- Domain: The email domain for users who should use SSO (e.g.,
Save Configuration:
- Click Save to apply the SAML configuration
Step 7: Test the Integration
- Log out of SigNoz if you're currently logged in
- Navigate to your SigNoz login page
- Try logging in with a JumpCloud user email
- Verify that you're redirected to JumpCloud for authentication
- Complete the JumpCloud login process
- Confirm you're successfully logged into SigNoz
Troubleshooting
Common issues and solutions:
- "Invalid certificate" error: Ensure you copied the complete certificate from the metadata file
- "Entity ID mismatch" error: Verify the Entity ID matches exactly between JumpCloud and SigNoz
- Users can't access SigNoz: Check that their email domain matches the configured domain in SigNoz