Jumpcloud Automated User Provisioning into WordPress using SCIM
Jumpcloud Automated User Provisioning into WordPress using SCIM
Configure real-time JumpCloud - WP user provisioning using SCIM. Our WordPress (WP) SCIM plugin allows you to automate user creation, update and delete user information from the IDP (Identity Provider) in real-time to your WordPress site. This guide will enable you to configure SCIM user provisioning for your WordPress site using JumpCloud as the Identity Provider, to achieve seamless automated real-time WordPress Jumpcloud SCIM user provisioning.
The following provisioning features are supported:
Push New Users :
New users created through JumpCloud will also be created in the WordPress site.
Push Profile Updates (Premium Feature):
Updates made to the user's profile through JumpCloud will be pushed to the WordPress site
Push User Deactivation (Premium Feature):
Deactivating the user or disabling the user's access to the application through JumpCloud will deactivate/delete the user in the WordPress site.
Note: For this application, deactivating/delete a user will depend on the configuration of miniOrange SCIM user provisioning add-on.
Reactivate Users (Premium Feature):
User accounts can be reactivated in the application.
Note: For the reactivating the user, it is required to select the Deactivation mode in the SCIM user provisioning add-on.
Import Users (Premium Feature):
Users can import active users from WordPress to JumpCloud.
Follow the steps below for configuring JumpCloud SCIM user provisioning in WordPress (WP)
Step 1: Configure WP SCIM user provisioning plugin
Install the premium plugin and login using your miniOrange credentials.
You would require a license key to activate the plugin. (Note :- In case you already have the paid version of the miniOrange SAML 2.0 SSO plugin you won’t require a to login or license key).
Select the Identity Provider as JumpCloud.
You can find the SCIM Base URL and Bearer token in the SCIM configuration tab of the plugin.
Step 2: Configure JumpCloud for SCIM provisioning
Go to JumpCloud portal and login with the administrator account.
You will be presented with the home screen of JumpCloud.
In the left tab, under the User Authentication section, select the SSO.
Click on + to add the application.
In the search bar, search for the WordPress application and click on Configure button.
In the Genral Info tab, enter your application name in the Display Label block.
Navigate to the SSO tab, you can either upload the Service Provider Metadata or can enter manually SP Entity ID and ACS URL from the miniOrange SAML SP plugin.
Now, go to the home page and select your configured application. Then click on the Export Metadata button.
Navigate to the miniOrange SAML SP plugin. In the Service Provider Setup tab, enter the Identity Provider Name and Upload the Metadata file downloaded from the JumpCloud.
In the JumpCloud portal, inside your configured WordPress application, navigate to the Identity Management tab.
Scroll down to the bottom, enter the SCIM Base URL in the Base URL field and the SCIM Bearer token in the Token Key field from the SCIM Configuration tab of the SCIM User Provisioning plugin.
Click on the Test Connection button, if the configuration is successful then the success message will be displayed and then click on Activate button.
You can now assign the users to the app by going to the User Groups tab in the left pane.
Under the Users tab, assign the users to the application you created. Move to the Application tab and select the configured application and click on Save.
With this guide, we have successfully configured SCIM user provisioning between WordPress (WP) and Jumpcloud as the Identity Provider (IDP) using the WordPress SCIM plugin. This solution ensures that you are ready to roll out seamless and real-time WordPress Jumpcloud SCIM user provisioning within minutes.
Step 3: De-provisioning of Users [This is a premium feature]
You can select the deprovisioning mode in the SCIM configuration tab of the SCIM User Provisioning plugin.
By default, De-provisioning will delete the users from the WordPress site.
Step 4: Attribute Mapping for SCIM Users [This is a premium feature]
Attribute Mapping feature allows you to map the user attributes sent by your IDP to the user attributes in the WordPress site. These attributes can be seen on right hand corner.
Custom Attribute Mapping: This feature allows you to map any attribute sent by the IDP to the usermeta table of WordPress.
Click on Add Attribute button to add custom attribute field.
Under the Custom Attribute Name field, enter the attribute name you want to map.
Under the Attribute Name from the IDP filed, select the IDP attribute from the dropdown that you want to map.
Enable the toggle for an attribute if you want to display it in the WordPress Users table.Then Click on Save.
Step 5: SCIM Audit [This is a premium feature]
SCIM Audit allows you to keep the track of all the provisioning activity taking place. It shows you the detailed information about each user being provisioned. This information includes the User Action, Status, Created Date etc.
In the miniOrange SCIM User Provisoner plugin, naviagate to the SCIM Audit tab.
Here you can see all the User provision information.
Click on the Show Advanced Search button, to search the provisoned user details by using the search filters like Wordpress Username, IP Address etc.
On clicking the Clear Reports button, you can clear all the user provisioned details.
If you dont hear from us within 24 hours, please feel free to send a follow up email to firstname.lastname@example.org
This privacy statement applies to miniorange websites describing how we handle the personal
When you visit any website, it may store or retrieve the information on your browser, mostly in the
form of the cookies. This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not directly identify
you, but it can give you a more personalized web experience.
Click on the category headings to check how we handle the cookies.
Strictly Necessary Cookies
Necessary cookies help make a website fully usable by enabling the basic functions like site
navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any
personal identifiable information. However, some parts of the website will not work properly without
These cookies only collect aggregated information about the traffic of the website including -
visitors, sources, page clicks and views, etc. This allows us to know more about our most and least
popular pages along with users' interaction on the actionable elements and hence letting us improve
the performance of our website as well as our services.