Integrating JumpCloud SAML SSO and SCIM with Dialpad
  • 14 Sep 2023
  • 3 Minutes to read
  • Dark
  • PDF

Integrating JumpCloud SAML SSO and SCIM with Dialpad

  • Dark
  • PDF

Article Summary

Logging into Dialpad is easy and secure with JumpCloud single sign-on (SSO).

Let's dive into the details.

Who can use this feature
The JumpCloud SAML SSO and SCIM integration is available to Dialpad Ai VoiceAi Sales, and Contact Center customers on an Enterprise plan. 

Enable SAML in Dialpad

First things first, you'll need to enable SAML in Dialpad.

The steps below use an example domain called Wherever applicable, this value should be substituted with the proper domain identifier for your company.

Head to your Admin Settings from 

  1. Select My Company 
  2. Select Authentication
  3. Select SAML
  4. Navigate to Choose your provider 
  5. Select Custom                              image8.png
  6. Take note of the values for SP SSO Url (ACS) and SP Entity ID
    1. The values will differ based on the domain identifier of your company.
    2. Keep this tab open — we'll be revisiting this page after configuring SAML on JumpCloud.

Configure SAML SSO in JumpCloud

Now, its time to configure SAML SSO in Jumpcloud.

  1. Login to JumpCloud as an admin
  2. Select SSO 
  3. Select the + icon to add a new application
  4. Type Dialpad in the search bar
  5. Select configure
  6. Enter a Display Label, then select activate
    1. Select continue 
  7. Click on the created application 
  8. Navigate to the SSO tab 
  9. Update the SP Entity ID and ACS URL attributes with the values obtained from the Dialpad SAML configuration 

    JumpCloud attribute to populate

    Attribute name in Dialpad

    Example Value

    SP Entity ID

    SP Entity ID


    SP SSO Url (ACS)

  10. Select Save
  11. Click on the created application again to continue
  12. Navigate to the Attributes section within the SSO tab
  13. Verify that the Service Provider Attribute Name email is mapped to the JumpCloud attribute name email
  14. Click on the created application again to continue 
  15. Under the SSO tab, you’ll need the following attributes (found in the table) from JumpCloud. 
    1. The values against these attributes shall be configured back in the Dialpad SAML configuration tab.

Dialpad Attribute to populate

JumpCloud attribute to use

Example value

IdP Entity ID (Issuer)

IdP Entity ID





IDP Certificate*

Downloaded pem file (without the BEGIN and END tags)

* The IDP certificate can be downloaded from the left pane in JumpCloud:


Configure SAML in Dialpad

Now, its time to populate the IdP attributes in Dialpad. 

Head to your Admin Settings from 

  1. Select My Company 
  2. Select Authentication
  3. Select SAML
  4. Populate the IdP related attributes retrieved from the previous section (IdP Entity ID, IdP SSO URL and Certificate)
  5. Select Save


Setting up SAML Users 

Now that SSO has been configured, its time to set up the users. 

  1. In JumpCloud, login as an administrator
  2. Select User Groups
  3. Select the group for you'll be using with Dialpad
  4. Navigate to the Applications tab and select/check the Dialpad SSO application. image4.png
  5. Log in to JumpCloud as any test user (picked from the above group) using another browser profile/session. 
    1. The Dialpad application should be listed under Applications
  6. Next, using the same test user’s (non-admin) browser session, navigate to Dialpad Login in a different tab. 
  7. Click on Login with Another Provider. Enter the domain of the user and click on Next
    1. After a few redirections, the user should now be logged in to Dialpad.image6.png

Enable automatic user provisioning

JumpCloud and Dialpad support a SCIM 2.0-based automatic user provisioning system. With the configuration in place, creating user accounts, updates, and deactivation will happen automatically.

Acquire an API Key from Dialpad

  1. As a Dialpad administrator, navigate to Admin Settings > My Company > Authentication> API keys.
  2. Click on Add key and generate a new API key for JumpCloud with the default scopes (already selected).
  3. Save the key temporarily in a secure way. This will be required in the next section. 

Allow as a secondary domain for the company

For the SCIM integration to succeed, JumpCloud will try to create a test user with a domain. This domain needs to be added as a secondary domain in the company CSR before proceeding further. Contact Dialpad Support to have this enabled.

Enable identity management in JumpCloud

To enable identity management in JumpCloud:

  1. Login to JumpCloud as an admin
  2. Select the previously created Dialpad SSO application
  3. Navigate to the Identity Management tab
  4. Under Configuration Settings, verify the SCIM Version is SCIM 2.0
  5. Update the Base URL to have the value as
  6. For the Token Key attribute, use the API key generated in the previous section
  7. Click on Test Connection. Once it succeeds, the Group Management section becomes availableimage9.pngimage1.png
  8. Turn OFF group management and then click on activate. JumpCloud will perform a user creation/deletion test. Once the test succeeds, the integration is complete
  9. Select save

Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.