SAML2 Authentication⚓︎
1 About SAML2⚓︎
Note: SAML2 authentication is an enterprise feature of JumpServer.
- Click the gear icon in the top-right corner to enter the System Settings page, then click Authentication Settings > SAML2 to open the SAML2 configuration page.
- SAML2 (Security Assertion Markup Language 2.0) is an open standard for securely exchanging identity authentication and authorization data between identity providers (IdP) and service providers (SP). JumpServer authentication supports standard SAML2.
2 Configuration Parameters⚓︎
Detailed parameter descriptions:
| Parameter | Description | Example |
|---|---|---|
| SAML2 | Enable SAML2 authentication | Enable/Disable |
| SP Private Key | Upload SP private key file used to sign SAML requests and decrypt IdP responses | |
| SP Certificate | Upload SP certificate file generated from SP private key; used by IdP to verify signatures and encrypt responses | |
| IdP Metadata Address | IdP metadata address URL | https://saml2.example.com/realms/JumpServer/protocol/saml/descriptor |
| IdP Metadata XML | Manually enter IdP metadata XML; lower priority than address | |
| Advanced Settings | Advanced parameters for generating SP Metadata; see example below | |
| Mapped Attributes | User attribute mapping; correspondence between SAML2 and JumpServer fields | See JSON example below |
| Organization | After authentication and creation, user will be added to the selected organization | |
| Always Update User Info | When enabled, synchronize user info on every authentication (only name, username, email, phone, comment; groups only on first sync) | |
| Sync Logout | When enabled, logout will also sync SAML2 service logout |
- SP Private Key and SP Certificate must be used together to ensure SAML2 authentication communication security. SP private key is used for signing and decryption, SP certificate is used for verification and encryption.
- Only one of IdP Metadata Address and XML needs to be filled. If both are filled, the address takes priority.
- Advanced settings example:
{
"organization": {},
"security": {}
}
- SP Metadata provides service provider entity ID, endpoint URLs, certificates, and other information, facilitating IdP configuration.
- You can click View below the SP Certificate field to get SP Metadata.

- Attribute mapping example:
{
"name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"username": "uid",
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
}