Skip to main content

Configure Google Workspace as an Identity Provider

Overview

JumpCloud supports Federated Authentication, allowing your team to sign in with an external Identity Provider (IdP) instead of JumpCloud’s native login. This guide explains how to set up Google Workspace as an external IdP so your users can log in with their Google accounts while you continue managing devices and access policies in JumpCloud.

warning

This setup is only required if you decide to host your own OIDC app for JumpCloud authentication. ShiftControl will handle this configuration for you using our own client and project in JumpCloud as part of the onboarding process.

note

Federated login changes the flow for all users in the routing policy you apply. Test with a pilot group before rolling it out company-wide.

Prerequisites

  • Google super-admin rights and billing enabled in Google Cloud Console
  • JumpCloud Admin role
  • Ability to create projects and OAuth clients

Access Google Cloud Console

1

Go to Google Cloud

2

Open the Console

Click on Console at the top right corner of the page.

3

Log In

Log in with your Google account.

Create a Dedicated Project

1

Go to the Project Picker

Once logged in, go to the project picker and select New Project.

New Project button
2

Name and Create the Project

Name the project something obvious like JumpCloud OIDC and click Create.

Create Google Project

Configure the Auth Platform

1

Select OAuth Consent Screen

From the left navigation menu, select APIs & Services → OAuth consent screen.

2

Click Get Started

Click on Get Started.

Configure Auth Platform
3

Fill App Information

Fill in App name (e.g., JumpCloud OIDC) and the User support email. Click Next.

Configure Auth Platform App Info
4

Select Internal

Select Internal and click Next.

Configure Auth Platform Audience
5

Enter Contact Information

Under Contact Information, enter a contact email address, then click Next.

Configure Auth Platform Contact
6

Agree and Create

Under Finish, select to agree to the policy and click Continue, then Create.

Configure Auth Platform Finish

Configure Branding

1

Go to Branding

In the left menu, go to Branding.

2

Enter Authorized Domain

Scroll down to Authorized domains. Under Authorized domain 1*, enter jumpcloud.com.

3

Enter Developer Contact Information

Under Developer contact information, enter an Email address*.

4

Save Changes

Click SAVE.

Configure Auth Platform Domain

Configure Data Access

1

Go to Data Access

In the left menu, go to Data Access to manage the scopes.

2

Add or Remove Scopes

Click ADD OR REMOVE SCOPES.

3

Select Scopes

Select the first three scopes: email, openID, and profile.

4

Update and Save

Click UPDATE then SAVE.

Configure Auth Platform Data Access

Create OAuth Client Credentials

1

Go to Clients

In the left menu, go to Clients.

2

Create a New Client

In the top menu, click + CREATE CLIENT.

Configure Auth Platform Create Client
3

Select Application Type

On the next page, click the Application type* dropdown menu and select Web application.

4

Enter Client Name

Enter a Name*, such as JumpCloud OIDC, to associate it with JumpCloud.

5

Add Authorized Redirect URI

Under Authorized redirect URIs, enter https://login.jumpcloud.com/oauth/callback.

6

Create the Client

Click CREATE.

Configure Auth Platform Configure Client
7

Copy Client Credentials

You’ll get a successful OAuth client created modal with the Client ID, Client secret, Creation date, and Status. Copy the Client ID and Client secret to your clipboard. You’ll need these to configure Google Cloud in JumpCloud. Then click OK to exit out of the modal.

Add Google as an IdP inside JumpCloud

1

Log in to JumpCloud Admin Portal

Log in to the JumpCloud Admin Portal.

2

Navigate to Identity Providers

Navigate to Directory Integrations → Identity Providers.

3

Add Google as an Identity Provider

Click Add Identity Provider → Google.

4

Fill in Identity Provider Details

Fill in the fields:

  • Identity Provider Name: Google OIDC (or any label you prefer)
  • Google IdP URL: https://accounts.google.com
  • Client ID and Client Secret: Paste the values you copied from Google Cloud.
5

Save Changes

Click Save to save your changes.

Apply (or skip) a routing policy

JumpCloud lets you target federated login at specific groups. If you need that granularity, go to Directory Integrations → Routing Policies and attach your new IdP to a user group. If you skip this step, users will continue to authenticate with the native JumpCloud login until you apply the policy.

Managing the IdP

  • Edit — Update the display name, IdP URL, client ID, or client secret at any time from the IdP’s detail page.
  • Disable/Delete — Scroll to Delete Identity Provider at the bottom of the page. JumpCloud reverts impacted users to native authentication after deletion.

Troubleshooting tips

SymptomQuick check
Users loop back to Google loginConfirm the redirect URI matches exactly in both Google and JumpCloud
Error “invalid client”Regenerate and re-paste the Client Secret
Users still see JumpCloud loginVerify that a routing policy includes their user group