> **Building with AI coding agents?** If you're using an AI coding agent, install the official Scalekit plugin. It gives your agent full awareness of the Scalekit API — reducing hallucinations and enabling faster, more accurate code generation.
>
> - **Claude Code**: `/plugin marketplace add scalekit-inc/claude-code-authstack` then `/plugin install <auth-type>@scalekit-auth-stack`
> - **GitHub Copilot CLI**: `copilot plugin marketplace add scalekit-inc/github-copilot-authstack` then `copilot plugin install <auth-type>@scalekit-auth-stack`
> - **Codex**: run the bash installer, restart, then open Plugin Directory and enable `<auth-type>`
> - **Skills CLI** (Windsurf, Cline, 40+ agents): `npx skills add scalekit-inc/skills --list` then `--skill <skill-name>`
>
> `<auth-type>` / `<skill-name>`: `agentkit`, `full-stack-auth`, `mcp-auth`, `modular-sso`, `modular-scim` — [Full setup guide](https://docs.scalekit.com/dev-kit/build-with-ai/)

---

# JumpCloud - OIDC

Learn how to set up OpenID Connect (OIDC) Single Sign-On (SSO) using JumpCloud, with step-by-step instructions for OIDC application setup.
This guide walks you through configuring JumpCloud as your OIDC identity provider. You'll create a custom OIDC application, add the redirect URI, provide the required OIDC values in the SSO Configuration Portal, assign access, test the connection, and then enable Single Sign-On.

1. ## Create an OIDC Application

   Sign in to your **JumpCloud Admin Portal**. Go to **Access -> SSO Applications** and click **Add New Application**.

   > Image: JumpCloud SSO Applications page with Add New Application

   In the application catalog, search for **OIDC** and select **Custom OIDC App**.
   > Image: Search for Custom OIDC App in JumpCloud
   
   Continue through the setup, confirm the OIDC app selection by clicking **Next**.
   > Image: Select Custom OIDC App in JumpCloud
   
   Enter a recognizable Application name in **Display Label** field, and optionally upload an icon and click **Next**.
   > Image: Enter general information for the JumpCloud OIDC application
   
   Click **Configure Application**.
   > Image: JumpCloud Custom OIDC App review step with Configure Application button

2. ## Add Redirect URI

   From the **SSO Configuration Portal**, copy the **Redirect URI** under **Service Provider Details**.
   > Image: SSO Configuration Portal showing the JumpCloud OIDC Redirect URI

   In JumpCloud, open the recently created OIDC application and navigate to **SSO** -> **Configuration Settings**. Paste the copied URI into the **Redirect URI** field. Add the login url of your application in **Login URL** field.
   > Image: JumpCloud SSO configuration settings with Redirect URI and Login URL fields

3. ## Configure Attributes

   Scroll down to **Attribute Mapping** section, select **Email** and **Profile** as **Standard Scopes** and then click **Activate**.
   > Image: JumpCloud attribute mapping with Email and Profile standard scopes selected

4. ## Provide OIDC Configuration

   From JumpCloud, copy the **Client ID** and **Client Secret**. For **Issuer URL**, use `https://oauth.id.jumpcloud.com`.
   > Image: JumpCloud application activated dialog showing Client ID and Client Secret

   Add these values under **Identity Provider Configuration** in the **SSO Configuration Portal**, then click **Update**.
   > Image: SSO Configuration Portal fields for JumpCloud Client ID and Client Secret
   > Image: SSO Configuration Portal showing the JumpCloud Issuer URL after update

5. ## Assign Users/Groups

   On JumpCloud, navigate to **User Groups** tab. Assign the appropriate user groups to the new OIDC application and click **Save**.
   > Image: JumpCloud User Groups tab with assigned groups selected for the OIDC app

6. ## Test Connection

   In the **SSO Configuration Portal**, click **Test Connection** to verify your configuration.

   > note
>
> If the connection fails, you'll see an error, the reason for the error, and a way to solve that error right on the screen.

7. ## Enable Single Sign-On

   Once the test succeeds, click **Enable Connection** to allow assigned users to sign in with JumpCloud OIDC.
   > Image: SSO Configuration Portal with Enable Connection button for JumpCloud OIDC

   This completes the JumpCloud OIDC SSO setup for your application.


---

## More Scalekit documentation

| Resource | What it contains | When to use it |
|----------|-----------------|----------------|
| [/llms.txt](/llms.txt) | Structured index with routing hints per product area | Start here — find which documentation set covers your topic before loading full content |
| [/llms-full.txt](/llms-full.txt) | Complete documentation for all Scalekit products in one file | Use when you need exhaustive context across multiple products or when the topic spans several areas |
| [sitemap-0.xml](https://docs.scalekit.com/sitemap-0.xml) | Full URL list of every documentation page | Use to discover specific page URLs you can fetch for targeted, page-level answers |
