If your organization manages access to apps and accounts using IdP groups, for example by adding users to shift groups, you can now create Access Flow to control who can request temporary group membership.
Upon approved request, Apono will add users to groups and remove them after the access time is up.
- JumpCloud - Super Admin privilege to the Okta Admin Console
- Cloud Provider/K8S - Create secret privileges in cloud provider or Kubernetes secrets manager
- JumpCloud admin API Key
- Log in to your JumpCloud organization with the Apono dedicated admin user
- Click on your Profile (icon with your initials)
- In the menu click My API Key
- Copy the admin API Key
- Go to your cloud provider secret manager and create a new secret
- In the secret content store the following fields:
Value: The JumpCloud admin API token you copied in the previous step
- Tag the created secret with the following tag:
- Store the newly created secret
You can also use an existing secret you've already created for Apono
- Go to the Apono Catalog
- Under Resources, find the JumpCloud integration
- Click the integration
- Give the integration a name
- In Select Connector, choose a connector from the list of connectors or add a new connector
- In the Secret Store section, choose the secret store location you created in step 2. You can also use an existing secret you've already created for Apono
- Click Connect
- That's it!
Updated about 1 month ago