Skip to content

JumpCloud Appliance

JumpCloud

About

JumpCloud is a U.S.-based enterprise software company headquartered in Denver, Colorado.The company was formally launched in 2013 at TechCrunch Disrupt Battlefield as an automated server management tool. JumpCloud’s cloud based directory platform is used to securely manage users identity, devices, and access.

Product Details

Vendor URL: JumpCloud

Product Type: Cloud-based directory platform/LDAP

Product Tier: Tier III

Integration Method: Chronicle/API

Log Guide: Jumpcloud Directory Insights - Cyderes Documentation

Parser Details

Log Format: JSON

Expected Normalization Rate: near 100%

Data Label: JUMPCLOUD_DAAS

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
Hard-coded extensions.auth.type
association.op, changes.0.field, changes.1.field, changes.0.to, resource.name metadata.description
Hard-coded metadata.event_type
event_type, metadata.product_event_type
Hard-coded metadata.vendor_name
client_ip principal.ip
port principal.port
username, initiated_by.email, initiated_by.username, resource.username principal.user.userid
Hard-coded security_result
association.connection.from.name, changes.0.from src.hostname
association.connection.from.type, changes.1.from src.user.groupid
organization target.administrative_domain
association.connection.to.name, resource.email, changes.0.to, resource.hostname target.hostname
association.connection.to.type, changes.1.to target.user.groupid
username, initiated_by.email, initiated_by.username, resource.username, target.user.userid

Product Event Types

Event UDM Event Classification
All other events GENERIC_EVENT
association_change STATUS_UPDATE
user_password_change USER_CHANGE_PASSWORD
user_update or admin_update USER_CHANGE_PERMISSIONS
user_create USER_CREATION
ldap_bind,radius_auth_attempt,admin_login_attempt,user_login_attempt USER_LOGIN
user_unlocked,user_activated,user_password_warning_email USER_UNCATEGORIZED

Log Sample

{"error_message":"","geoip":{"longitude":-11.11,"timezone":"America/Chicago","latitude":11.11,"country_code2":"US","continent_code":"NA"},"mfa":true,"id":"888888888abcd","user_agent":{"build":"","name":"Chrome","os_name":"Windows","device":"Other","patch":"4472","os":"Windows","minor":"0","major":"91"},"timestamp":"2021-07-01T12:12:12Z","mfa_meta":{"type":"totp"},"service":"directory","@version":"1","auth_context":{"auth_methods":{"totp":{"success":true},"password":{"success":true}},"policies_applied":[{"id":"888888888abcd","metadata":{"resource_type":"USER_PORTAL","action":"ALLOW_WITH_MFA","targets":["USER_GROUP_INCLUSION"]},"name":"Enforce MFA on All Users in O365 Group"}]},"event_type":"user_login_attempt","success":true,"organization":"888888888abcd","client_ip":"1.2.3.4","initiated_by":{"id":"888888888abcd","type":"user","username":"john.doe"}}

Sample Parsing

metadata.event_timestamp.seconds = 1625141532
metadata.event_type = USER_LOGIN
metadata.vendor_name = "Jumpcloud"
metadata.product_event_type = "user_login_attempt"
principal.user.userid = "john.doe"
principal.ip = "1.2.3.4"
target.user.userid = "john.doe"
target.administrative_domain = "888888888abcd"
security_result.summary = "user_login_attempt"
security_result.action = ALLOW
extensions.auth.type = MACHINE

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon