{"id":110530,"date":"2024-05-17T17:36:13","date_gmt":"2024-05-17T21:36:13","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=110530"},"modified":"2025-04-08T14:38:54","modified_gmt":"2025-04-08T18:38:54","slug":"integrate-with-exium","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/integrate-with-exium","title":{"rendered":"Integrate with Exium"},"content":{"rendered":"\n
Use 探花大神 SAML Single Sign On (SSO) to give your users convenient but secure access to all their web applications with a single set of credentials. Automatically provision, update and deprovision users in Exium from 探花大神 using the Identity Management (SCIM) integration. Leverage this integration to centralize user lifecycle, user identity, and group management in 探花大神 for Exium. Save time and avoid mistakes, as well as potential security risks, related to manually creating users.<\/p>\n\n\n\n
Read this article to learn how to integrate with Exium. <\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n Important Considerations<\/strong><\/p>\n\n\n\n Attribute Considerations<\/strong><\/p>\n\n\n\n If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL<\/strong> field.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n The SSO IdP URL<\/strong> is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Metadata can also be downloaded from the Configured Applications<\/strong> list. Search for and select the application in the list and then click Export Metadata<\/strong> in the top right corner of the window.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Users are implicitly denied access to applications. After you connect an application to 探花大神, you need to authorize user access to that application. You can authorize user access from the Application Configuration<\/strong> panel or from the Groups Configuration<\/strong> panel. <\/p>\n\n\n\n To learn how to authorize user access from the Groups Configuration<\/strong> panel, see Authorize Users to an SSO Application<\/a>.<\/p>\n\n\n\n The Client ID and Secret (token) may only be shown once. Copy them to a secure location, like the 探花大神 Password Manager<\/a>, for future reference.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n The following table lists attributes that 探花大神 sends to the application. See Attribute Considerations<\/a> for more information regarding attribute mapping considerations. <\/p>\n\n\n\n\n
\n
\n
\n
Creating a new 探花大神 Application Integration<\/strong><\/h2>\n\n\n\n
\n
<\/p><\/div>
\n
<\/p><\/div>
\n
\n
Configuring the SSO Integration<\/strong><\/h2>\n\n\n\n
To configure 探花大神<\/strong> 1<\/strong><\/h3>\n\n\n\n
\n
Download the 探花大神 metadata<\/strong> file<\/strong><\/h4>\n\n\n\n
\n
<\/p><\/div>
To configure Exium<\/strong><\/h3>\n\n\n\n
\n
To configure 探花大神 2<\/strong><\/h3>\n\n\n\n
\n
\n
Authorizing User SSO Access<\/strong><\/h2>\n\n\n\n
To authorize user access from the Application Configuration panel<\/strong><\/h3>\n\n\n\n
\n
Validating SSO authentication workflow(s)<\/strong><\/h2>\n\n\n\n
SP-initiated<\/strong><\/h3>\n\n\n\n
\n
Configuring the Identity Management Integration<\/strong><\/h2>\n\n\n\n
To configure Exium<\/strong><\/h3>\n\n\n\n
\n
<\/p><\/div>
To configure 探花大神<\/strong><\/h3>\n\n\n\n
\n
\n
Attribute Mappings<\/strong><\/h2>\n\n\n\n