BlueJeans SSO Integration
Group Admins can choose one of two Authentication Options for their Enterprise Group, BlueJeans Username & Password or SAML (Single sign-on). By default, Enterprise Groups will use the standard BlueJeans Username & Password method of authenticating their users. If an Enterprise Group has been provided a Landing Page, then Single single-on integration becomes available.
Note: Check with your idP when choosing a Unique Identifier to setup with BlueJeans. The value needs to be something persistent i.e Employee ID, Username etc. which does not change over time. Using email addresses as persistent ID is NOT recommended as these are usually subject change over time and can lead to creating duplicate accounts.
To enable SSO for your group, use the following instructions:
1. Access your Admin Console, select Group Settings from the side menu, and click on the Security tab.
2. Choose "SAML Single Sign On" as your Authentication Option.
3. Enable or Disable "Automatic Provisioning." We recommend this feature be turned on. When a new user signs into the SSO Landing Page, a BlueJeans account will be automatically created for them. If the feature is turned off, then Group Admins will need to create the account before users can login via SSO.
4. Upload your x.509 SAML certificate to BlueJeans.
5. Enter a login form URL from your Identity Provider.
6. Set the password change URL. If you do not have one, you can enter the URL for your Landing Page.
7. Set a Logout URL. If you do not have one, you can enter the URL for your Landing Page.
8. Set a custom error Page URL. (Optional, but Recommended)
- If there was an error during SSO authentication, users will be directed to this URL.
- When left blank, users will receive an SSO specific error message with instructions to consult their local admin.
9. SAML Meta Data will be populated for you and based on your Landing Page. If you want to view the BlueJeans SAML Metadata, Click Here.
10. Your RelayState URL will be populated after configuring the Attribute Mapping.
11. Configure your Attribute Mapping according to your IdP setup.