Authentication > Integrate Okta SSO
Integrate JumpCloud SSO
Connect JumpCloud with Tallyfy using SAML-based SSO for automatic user login and account creation. Setup takes about 30 minutes.
- JumpCloud administrator account
- JumpCloud SSO Package or higher (or SSO add-on)
- Tallyfy Pro or Enterprise plan
- SAML configuration values from Tallyfy Support
- Create a custom SAML application in JumpCloud
- Configure service provider settings and attribute mappings
- Exchange metadata with Tallyfy Support and enable SSO
-
Sign in to the JumpCloud Admin Portal
-
Go to Access from the main menu
-
Select SSO Applications
-
Click the + button to add a new application

-
Click Custom SAML App

-
Select the General Info tab
-
Enter “Tallyfy” as the Display Label
-
Optionally add a description and upload the Tallyfy logo
-
Click Save

Tallyfy’s service provider configuration tells JumpCloud where to send authentication data.
- Contact Tallyfy Support to access your organization’s profile
- Go to the Org Settings tab
- Click Add Configuration Details
- Locate the default SAML values section
- You’ll need two values:
- SP ACS URL (Assertion Consumer Service URL)
- SP Entity ID (Service Provider Entity ID)
-
In your JumpCloud SAML application, select the SSO tab
-
IDP Entity ID - auto-generated by JumpCloud, leave as is
-
IDP URL - auto-generated by JumpCloud, leave as is
-
SP Entity ID - enter the value from Tallyfy’s “SP Entity ID” field
-
ACS URL - enter the value from Tallyfy’s “SP ACS URL” field

-
SAMLSubject NameID - select email from the dropdown
-
SAMLSubject NameID Format - select urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
-
Keep Sign Assertion checked (default)
-
Leave Default RelayState empty unless Tallyfy Support says otherwise
JumpCloud needs to know which user info to send to Tallyfy. Add these three attributes:
-
Scroll to the User Attribute Mapping section
-
Click add attribute and configure the email attribute:
- Service Provider Attribute Name:
email - JumpCloud Attribute Name: Select
email
- Service Provider Attribute Name:
-
Click add attribute again for the first name:
- Service Provider Attribute Name:
FirstName - JumpCloud Attribute Name: Select
firstname
- Service Provider Attribute Name:
-
Click add attribute one more time for the last name:
- Service Provider Attribute Name:
LastName - JumpCloud Attribute Name: Select
lastname

- Service Provider Attribute Name:
-
Click Save
These names are case-sensitive. Your mappings should look like this:
| Service Provider Attribute | JumpCloud Attribute |
|---|---|
| FirstName | firstname |
| LastName | lastname |
-
In your JumpCloud SAML application, stay on the SSO tab
-
Find the IDP Certificate Valid section
-
Note these three values (you’ll send them to Tallyfy Support):
- IDP Entity ID
- IDP URL (Single Sign-On URL)
- IDP Certificate (X.509 Certificate)

-
Alternatively, click export metadata at the bottom of the SSO tab and save the XML file to send to Tallyfy Support instead
- Send the IDP Entity ID, IDP URL, and X.509 Certificate to Tallyfy Support (or send the metadata XML file)
- Tallyfy Support will configure these values in your organization’s SAML settings
- Wait for confirmation that configuration is complete
Once Tallyfy Support confirms your settings are configured:
-
In JumpCloud, go to the User Groups tab in your Tallyfy application
-
Select the user groups or individual users who should access Tallyfy
-
Click Save
-
Toggle the application to Active

-
Coordinate with Tallyfy Support to toggle the SAML activation switch for your organization
Once everything’s configured:
- Get the Tallyfy SSO login URL from Tallyfy Support
- Share this URL with users assigned to the JumpCloud application
- Users can also access Tallyfy through their JumpCloud user portal
What happens at login:
- Existing Tallyfy account - they’re logged in automatically with JumpCloud credentials
- No account yet - Tallyfy creates one on first login using the email, first name, and last name from JumpCloud
- Steps 1-11 are the one-time setup between your Admin, JumpCloud, and Tallyfy Support
- Steps 12-18 happen every time a user logs in
- Tallyfy auto-creates accounts for new users (step 17) using email and name attributes from JumpCloud
Can’t log in? Check these first:
- Is the user assigned to the JumpCloud application?
- Are attribute mappings exact? Names are case-sensitive -
FirstNamenotfirstname - Is the X.509 certificate still valid in JumpCloud?
- Are users going to the SSO URL or JumpCloud portal - not the regular Tallyfy login page?
- Is the application set to Active in JumpCloud?
- Still stuck? Contact Tallyfy Support.
Certificate management - JumpCloud auto-generates and manages certificates when you activate an application. Monitor expiration dates in the JumpCloud Admin Portal.
User portal access - Users can access Tallyfy through their JumpCloud portal alongside other apps.
Just-in-time provisioning - User accounts in Tallyfy are created automatically on first SSO login. No manual provisioning or SCIM setup needed.
Group-based access - Control Tallyfy access by assigning JumpCloud user groups rather than individual users.
Authentication > Integrate Microsoft Entra ID SSO
Authentication > Integrate OneLogin SSO
Integrations > Authentication and SSO
Was this helpful?
- 2025 Tallyfy, Inc.
- Privacy Policy
- Terms of Use
- Report Issue
- Trademarks