Many organizations believe they have secure access handled when they roll out single sign-on (SSO)... until an auditor comes in and mandates that network devices like switches and firewalls must also have multi-factor authentication (MFA) enabled for compliance. Active Directory and most cloud Identity Providers (IdP) don’t provide support for LDAP authentication without additional on-premise components. True story: A former team member from a previous job had to set up servers to implement MFA for network devices to pass a PCI audit. His employer didn’t suspend other work; he just had to work more.
JumpCloud provides Cloud LDAP that’s protected by environment-wide MFA, without additional back-ups, servers, licenses, or other failover components to manage. IT teams benefit by being more focused on the work that matters and maximizing the potential of their headcount. Centralizing identity and access management also makes compliance audits easier to handle and less intensive.
Not every step here is necessary to complete this tutorial. However, if you want to experience your evaluation of this (and other) feature as if you’re implementing the product, we recommend the following:
This walkthrough will show you how to set up an LDAP binding user, add users to the LDAP directory, and manage MFA for access control. You’ll be able to achieve true SSO to all resources. It will only take a few minutes. Let’s get started.
Are you a visual learner? Watch this video tutorial or take this short course at JumpCloud University.
Considerations:
Resources:
Resources:
Advanced LDAP (JumpCloud University Course)
Connect New Users to Resources
LDAP Configuration Details and Supported Standards
If your organization has LDAP applications that require extra security, you can build a Conditional Policy or Global Policy to enable multi-factor authentication (MFA) as a requirement before users can access the applications.
To configure MFA for LDAP Applications as a Conditional Policy:
Ensure that your LDAP hostname is updated and click the I have updated the LDAP hostname for applications I want affected by this policy checkbox.
Considerations:
Resources:
Get Started | Conditional Access Policies
Overview of Single Sign-On (SSO)
Enabling MFA For Multiple Users
You’ve just learned how to set up a cloud LDAP server. It’s a good starting point, but also considering using Conditional Access for every SSO app for a Zero Trust approach to security.
Get prepped now
JumpCloud Protect can be used to log into the Admin Portal, User Portal (where LDAP apps reside), or devices (Windows, Mac, Linux). Before your users can use the JumpCloud Protect mobile app, you, as an administrator, must enable it.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
New to the site? Take a look at these additional resources:
Ready to join us? You can register here.