# How to Set Up JumpCloud as IDP ## Create and set up JumpCloud SSO (Single Sign-On) Application This step depends heavily on how you plan to use [JumpCloud](https://jumpcloud.com). This page assumes custom OIDC application (managing everything within JumpCloud), but integrations with [Google](https://jumpcloud.com/support/configure-google-workspace-identity-provider), [Microsoft](https://jumpcloud.com/support/configure-azure-as-identity-provider) and other accounts is possible.
JumpCloud Application Creation Interface
Some key points: - Auditbox **does not support SAML** (Security Assertion Markup Language), **only OIDC** (OpenID Connect) authentication protocol, so some login options are not currently supported. - Client authentication type should be set to **Client Secret Post**. - Login url should be the base url of where Auditbox is deployed. - Make sure your test user has permissions to access the application. - Make sure that the SSO setup has proper redirect URL. Upon logging in, you must be redirected onto **${auditbox-host}/auth/callback/keycloak**. ## Configure Auditbox Auditbox managed IDP setup via environmental variables. Below is an overview of how the values should be configured. ```yaml IDP_CLIENT_ID: IDP_CLIENT_SECRET: # These values are always the same and can be inserted as is IDP_AUTHORIZE_ENDPOINT: https://oauth.id.jumpcloud.com/oauth2/auth IDP_TOKEN_ENDPOINT: https://oauth.id.jumpcloud.com/oauth2/token IDP_JWKS_URI: https://oauth.id.jumpcloud.com/.well-known/jwks.json ```