JumpCloud

Is JumpCloud Down Right Now? Check if there is a current outage ongoing.

JumpCloud is currently Operational

Last checked from JumpCloud's official status page

Historical record of incidents for JumpCloud

Report: "Degraded RADIUS Service"

Last update
investigating

We're currently investigating reports of issues with JumpCloud's RADIUS-as-a-Service. We are investigating the cause of the issues.

Report: "Degraded Support Portal Service"

Last update
investigating

We are currently investigating intermittent reports of Administrators being unable to submit support cases via the JumpCloud Admin Portal. Support cases can still be submitted by emailing support@jumpcloud.com. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Degraded System Insights Service"

Last update
investigating

We are currently investigating an issue with System Insights displaying incorrect Local User Information in the Admin Console. We will report back as soon as we have an update. We apologize for any disruption this may cause. Thank you,

Report: "Degraded Admin Console Service"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We're currently investigating an issue with JumpCloud's Console where Administrators may be unable to save changes for some device records. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Degraded Admin Console Service"

Last update
Investigating

We're currently investigating an issue with JumpCloud's Console where Administrators are unable to save changes for device records. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Active Directory User Status Impacted"

Last update
postmortem

![](https://lh7-rt.googleusercontent.com/docsz/AD_4nXd_QdShqZYjI1LqTG_04ClPKE8TK_-FSPeUR4AtFUY1wplTIkCyG7PxpoZ3el5SS7oqqW5xzaJ4Xz0KfT2xiSZvCa5Sf2VSMjN6xoTHiowbSCEQVujfFjPc5B_E7KI220Q6dvDn-Q?key=VkzWehm2zwJ1rni6Yw12mg) # **Incident Report** ‌ **Date**: May 12, 2025 **Date of Incident:** May 2, 2025 **Description**: RCA for ADI User Login Errors ‌ **Summary:** On May 2nd, at approximately 07:00 UTC, a change was deployed to JumpCloud’s Active Directory Integration causing a warning message to appear and preventing successful logins for some users across a subset of organizations.  During that time the workaround for users was to change their password, which then allowed a successful login. ‌ **Root Cause:** The change introduced was part of an effort to modernize external user identification in Active Directory, which inadvertently caused an error in handling some restricted attributes. This resulted in the incorrect transformation of these fields, setting the password status of some external user accounts to "pending”.  This event disrupted user access and necessitated a password update for the affected users until JumpCloud successfully rectified their account status. ‌ How was this missed in your testing?  Unfortunately, the change affected a subset of users that had a unique combination of values set on their user record.  Specifically, the logic was only applied to users that had an empty value on their restricted fields.  The testing that was performed did not contain a user in that state, incorrectly passing the test. ‌ **Corrective Actions / Risk Mitigation:** 1. Revert that code version - DONE 2. Modify all incorrect user entries in our backend systems - DONE 3. Increased testing scenarios verifying all user states and backward compatibility - IN PROGRESS

resolved

This incident has been resolved.

monitoring

We have completed implementation of our remediation plan and do not anticipate any further impact. We will continue to monitor for any issues.

identified

We are continuing with our implementation of our remediation plan. We anticipate several more hours to complete. We will provide another update in two hours.

identified

We have identified a fix for this issue. We have validated our remediation plan and are implementing it now. The plan will take several hours to complete. We will provide another update in one hour.

identified

We are in the process of validating our remediation plan. We will communicate it as soon as it is ready. We will share another update in one hour.

identified

We have reverted the update which caused the initial impact. There should be no new occurrences. We are creating a remediation plan at this time and will share it as soon as it is ready. We will share another update in one hour.

identified

We have identified the cause of the issue and are refining the fix to be implemented. We will share another update in one hour.

identified

We have identified the cause of the issue and a fix is being implemented. We will share another update in one hour.

investigating

We are continuing to investigate reports of user accounts being changed to pending status for tenants integrated with Active Directory Bridge. We will share another update in one hour.

investigating

We are investigating reports of user accounts being changed to pending status for tenants integrated with Active Directory Bridge.

Report: "Authentication Service Failures"

Last update
postmortem

![](https://lh7-rt.googleusercontent.com/docsz/AD_4nXdJTDHu6nwjsVpc24PfPik9fNRnfkb2sBFefB-1HYs_wnxUsJ0-IK1zbL1gKs04ARc2-vsSp_nQnSoe6yNYTEsMn4WGfj9WhaKd_h8JP2eKDNXVk5C26nAawvYlx-nl7kXr0Zpj_A?key=58dfg4GavX6z3tye_szSU7MN) # Incident Report **Date**: May 5, 2025 **Date of Incident:** Apr 30, 2025 **Description**: RCA for User Portal / SSO Failed Authentication ‌ **Summary:** On April 30th at 12:35 UTC our monitors detected a significant increase in errors across our User Console API endpoints. The increased errors manifested as failed authentication for new attempts to the User Portal, SSO and other services.  Existing connections to applications continued uninterrupted. At 12:41 UTC a formal incident was declared and multiple teams were paged. The issue was resolved at 12:58 UTC ‌ **Root Cause:** A state transition anomaly occurred during the credential rotation process for a database within our authentication infrastructure, resulting in connection failures by dependent services to that layer. Consequently, end-users experienced authentication errors when attempting to establish new sessions with specific applications. ‌ The authentication service team was able to identify a failure with secondary credentials during the rotation and quickly failed back to valid secrets. ‌ ‌ **Corrective Actions / Risk Mitigation:** 1. Fail back to primary secrets - DONE 2. Increased automation for secrets rotation at this layer - IN PROGRESS

resolved

This incident has been resolved.

monitoring

We have identified an issue that was affecting authentication and SSO and have implemented a fix. Services have recovered and we are monitoring.

Report: "Authentication Service Failures"

Last update
Postmortem
Resolved

This incident has been resolved.

Monitoring

We have identified an issue that was affecting authentication and SSO and have implemented a fix. Services have recovered and we are monitoring.

Report: "Active Directory User Status Impacted"

Last update
Investigating

We are investigating reports of user accounts being changed to pending status for tenants integrated with Active Directory Bridge.

Report: "Authentication service interruption"

Last update
Monitoring

We have identified an issue that was affecting authentication and SSO and have implemented a fix. Services have recovered and we are monitoring.

Report: "Degraded Reports Service"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently investigating an issue with JumpCloud Reports failing to download. We will update the status as we learn more.

Report: "Degraded Reports Service"

Last update
Investigating

We are currently investigating an issue with JumpCloud Reports failing to download. We will update the status as we learn more.

Report: "Active Directory Integration Connection Failures"

Last update
postmortem

![](https://lh7-rt.googleusercontent.com/docsz/AD_4nXenIG3rQbLigul5tQnHOQbNsatQ3myI0jgAIM4j9RG096hX4O42Tp3JQsJJxW7hJlXLeFlYtEU_pmFgOC7_pnTp9OtsgdDdaJIoDt0_KMEAUnnDuupDQlUVbPUtKy_xMerp1f0Iew?key=S6_XohKSjFttE6LHRnFX_PXT) **Date**: Apr 23, 2025 **Date of Incident:** Apr 18, 2025 **Description**: RCA for ADI Outage ‌ **Summary:** On April 18th at 1:27 PM MT JumpCloud experienced an issue affecting our Active Directory Integration \(ADI\) agents. Some customers using ADI sync and Delegated Auth experienced connectivity issues, resulting in failed directory synchronizations and authentication attempts. New ADI installs would have failed during the incident window, and ADI agents attempting to restart or reconnect during the incident window would have failed. ‌ **Root Cause:** The incident was caused by the expiration of a certificate used for mutual TLS \(mTLS\) authentication between ADI agents and our infrastructure. This certificate is essential for securing the communication channel between customer environments and JumpCloud services. ‌ Why wasn’t this caught before the certificate expired? In mid-2024 we migrated our global proxy infrastructure from EC2 into Kubernetes. During this transition, monitoring for the proxies that handle mTLS were mistakenly deleted and not recreated on the new infrastructure. ‌ Why did it take so long to recover? There are two reasons recovery took longer than it should have. The first reason is the missing monitoring above meant this went unnoticed by our operations teams once the cert expired. The second is our teams did not see any instability or outage signals in our internal telemetry, which led them to believe this was customer environment specific. This was because existing connections were un-impacted. ‌ **Corrective Actions / Risk Mitigation:** ‌ 1. Enhancing our certificate monitoring systems to provide earlier notifications of upcoming expirations - DONE 2. Improving our internal escalation procedures to reduce time-to-resolution - DONE 3. Implement additional automated testing to detect potential authentication issues - PLANNING 4. Creating more comprehensive documentation for critical operational procedures - WIP

resolved

This issue has been resolved and service has now returned to normal.

identified

We are currently in the process of implementing a fix for this issue.

identified

We have identified an issue affecting the Active Directory Integration Sync and Import services, including Active Directory Delegated Authentication. This issue affects users, user updates, and password changes are not syncing between JumpCloud and Active directory, as well as delegated authentication to Active Directory. In the meantime, if your users are unable to authenticate because you have delegated authentication enabled for your users, please review the following article for steps on disabling delegated authentication. https://jumpcloud.com/support/adi-use-ad-delegated-authentication#disabling-delegated-authentication-for-users

investigating

The Active Directory Integration Service was found encountering errors and we are investigating the issue.

Report: "Active Directory Integration Connection Failures"

Last update
Postmortem
Resolved

This issue has been resolved and service has now returned to normal.

Update

We are currently in the process of implementing a fix for this issue.

Identified

We have identified an issue affecting the Active Directory Integration Sync and Import services, including Active Directory Delegated Authentication.This issue affects users, user updates, and password changes are not syncing between JumpCloud and Active directory, as well as delegated authentication to Active Directory.In the meantime, if your users are unable to authenticate because you have delegated authentication enabled for your users, please review the following article for steps on disabling delegated authentication.https://jumpcloud.com/support/adi-use-ad-delegated-authentication#disabling-delegated-authentication-for-users

Investigating

The Active Directory Integration Service was found encountering errors and we are investigating the issue.

Report: "Active Directory Integration erroring out"

Last update
Investigating

The Active Directory Integration Service was found encountering errors and we are investigating the issue.

Report: "Password Manager Email Notifications"

Last update
resolved

This incident has been resolved.

identified

We believe we have identified the issue that was impacting the distribution of the Password Manager enrollment emails. We are currently working on implementing a fix.

investigating

We are currently investigating an issue involving the distribution of Password Manager enrollment emails. We are investigating the cause of the issue currently, and will update the status event once resolved.

investigating

We are currently investigating an issue with the Password Manager notifications part of our platform.

Report: "Password Manager Email Notifications"

Last update
Investigating

We are currently investigating an issue with the Password Manager notifications part of our platform.

Report: "Increased Error rates with iOS device management"

Last update
resolved

This incident has been resolved.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently observing elevated error rates in the management of iOS devices. This may manifest for administrators as missing MDM tabs, impaired policy functionality, and failures in executing MDM commands.

Report: "Increased Error rates with iOS device management"

Last update
Investigating

We are currently observing elevated error rates in the management of iOS devices. This may manifest for administrators as missing MDM tabs, impaired policy functionality, and failures in executing MDM commands.

Report: "Policy Service Degradation"

Last update
resolved

This incident has been resolved.

monitoring

The delays with policy deployment have returned to normal and we are continuing to monitor queues.

identified

There continues to be a delay in processing the application of new and modified device policies to macOS, Windows, and Linux systems. During this time existing policies applied to devices will continue to function as expected but application of new policies and policy changes will be impacted.

investigating

We are continuing to investigate reports of JumpCloud Device Policies failing to apply on macOS, Linux and Windows devices.

investigating

We are continuing to investigate reports of JumpCloud Device Policies failing to apply on macOS, Windows, and Linux operating systems.

investigating

We are continuing to investigate reports of JumpCloud Device Policies failing to apply on macOS, Linux and Windows devices.

investigating

We are currently investigating reports of JumpCloud Device Policies failing to apply on macOS, Windows, and Linux operating systems.

investigating

We are currently investigating reports of JumpCloud Device Policies failing to apply on macOS and Windows devices.

Report: "Degraded Remote Assist Agent Service"

Last update
resolved

This incident has been resolved.

identified

The issue has been identified and a fix is being implemented.

investigating

We're currently investigating reports of degraded performance or intermittent connection issues with JumpCloud's Remote Assist Agent. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Degraded JumpCloud Premium Chat"

Last update
resolved

This incident has been resolved.

investigating

We are currently experiencing issues with the JumpCloud Premium Support Chat function. Customers are able to submit tickets via the Admin Console. Instructions for submitting tickets via the Admin Console can be found here: https://jumpcloud.com/support/contact-jumpcloud-support#submitting-a-support-ticket-from-the-admin-portal

Report: "Device Propagation Delays"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently investigating an issue with higher than normal propagation times for devices. We will update this issue as we know more.

Report: "Degraded Directory Insights"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being evaluated.

investigating

We're investigating reports of degraded performance with JumpCloud's Directory Insights service. We are investigating the cause of the issues currently, and will update the status once resolved.

Report: "RADIUS authentication in us-west-2 region"

Last update
resolved

This incident has been resolved.

monitoring

We are currently monitoring RADIUS authentication failures in the US West region. The service is operational at this time.

Report: "JumpCloud Agent / MDM Enrollments"

Last update
postmortem

![](https://lh7-rt.googleusercontent.com/docsz/AD_4nXd8V5CQ4t8K7KPpqB08mD2R7BywaO8_QYgFQ4-rCvxqdRGPdjMstcs51NgXzLg9GKfTrTJRbQnRqiud7QxwyQBADxSmV-opWA8fpvFjqWmfi2sWmh79M4WKH74jZ1V0mwPggMOToQ?key=iohiwlPpz5NbA3CkNS3LMqBZ) **Date**: Jan 17, 2025 **Date of Incident:** Jan 16, 2025 **Description**: RCA for Apple MDM Un-enrollment ‌To start, we’d like to acknowledge and apologize for the impact this incident had. We pride ourselves in operating with excellence and have increased efforts to minimize impact when things go wrong. We missed the mark here. ‌ **Summary:** On January 16th at 11:38 AM MT JumpCloud deployed a new version of Apple MDM.  At 11:47 AM JumpCloud detected macOS devices un-enrolling from Apple MDM and an investigation began.  At 12:03 PM a formal incident was declared and our incident management team came online to coordinate multiple teams in recovery efforts.  At 12:14 PM MT a feature flag was disabled, stopping the queuing of any further un-enrollments \(more on this later\).  At 12:15, the new code was completely rolled back, and at 12:32 JumpCloud deleted the command queue containing any further un-enrollment directives.  At this point, the teams worked to find the quickest solutions to provide customers for safely re-enrolling systems, and a comms plan for affected customers making them aware of the issue. ‌ **Root Cause:** First, let's start with some context on how JumpCloud uses feature flags. Our practice is to deliver code to production through small changes. This reduces the risks inherent with large changes and allows us to quickly identify what specific change could be responsible for erroneous behavior.  Feature flags are essentially if-statements in the code that determine which path to follow and execute.  When a flag is “on” new code is executed, and when the flag is “off” the code is skipped.  Our teams use these often with our deployments, providing the ability to turn features on or off based on certain attributes \(like organization id\) without modifying the source code.  This is where things went wrong. ‌ The actual change deployed was in an effort to introduce Apple Declarative Device Management \(DDM\) support, which lets devices apply configurations independently based on certain criteria.  For an existing device we match on a number of factors, one of which being the unique device identifier \(UDID\) generated at enrollment. This is a security measure to prevent impersonation or a fake device.  Unfortunately, with this new API the UDID did not match for some macOS devices, causing device un-enrollment.  This was not caught in our pre-production environments because the intended state for the feature flag controlling this change was off. In the pre-production environments our testing passed because this code path was not active. ‌ Why was the feature flag on?  The teams use a rollout status with each flag, along with other identifiers for that code block.  What we missed was a validation step ensuring the feature flag was in the expected state before releasing the code to production. ‌ What are you doing to ensure this doesn’t happen again?  With every incident, we perform a thorough post incident review to address gaps in many areas, including process and testing.  We take these very seriously and discuss all incidents on a bi-weekly cadence with the entire engineering organization.  These reports then get rolled up to our executive staff.  This incident clearly exposed a gap in validation and we have changes in flight immediately to address that.  We’ve also stopped any future deployments until this gap \(and any others we find with this investigation\) is closed and approved by our SRE team. ‌ ‌ **Corrective Actions / Risk Mitigation:** 1. Flip the feature flag to off for this code block, and revert the code - DONE 2. Stop production deploys for this code base  - DONE 3. Review and harden the validation steps for feature flags - IN PROGRESS 4. Modify our automation to test code with feature flags in both positions - IN PROGRESS

resolved

This incident has been resolved. To enroll devices again, customers can follow the below steps: ADE-enrolled devices If you have devices configured for ADE there are two options to restart the ADE enrollment; Administrator Privileges Required* see: https://jumpcloud.com/support/set-admin-sudo-permissions Setup a command to execute `sudo profiles renew -type enrollment` Or Have your users execute `sudo profiles renew -type enrollment` in a terminal window In both scenarios the user will be prompted to complete the re-enrollment of the device. This action will require the user to have administrator privileges on the device, at that time. Non-ADE enrolled devices For devices that are not configured for ADE enrollment it is advisable to apply the JumpCloud MDM Enrollment policy (https://jumpcloud.com/support/create-a-mac-mdm-enrollment-policy). Note, this still requires the user to have administrator privileges to complete the MDM enrollment when they complete the enrollment process. Admins may temporarily elevate standard users to admin users by following the steps laid out in this article: https://jumpcloud.com/support/set-admin-sudo-permissions. Additional Support Articles for Remediation https://jumpcloud.com/support/re-enroll-apple-devices-into-mdm-and-preserve-device-record https://jumpcloud.com/support/set-admin-sudo-permissions https://jumpcloud.com/support/create-a-mac-mdm-enrollment-policy

monitoring

We've identified the issue and implemented a fix. Users that were un-enrolled from Apple MDM may need to re-enroll their device. More information on re-enrolling Apple devices can be found below: https://jumpcloud.com/support/re-enroll-apple-devices-into-mdm-and-preserve-device-record

investigating

We are currently investigating an issue with agent installs and Apple MDM enrollments. We will update this issue as we know more.

Report: "Degraded LDAP MFA Service"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We're currently investigating reports of intermittent authentication issues with JumpCloud's MFA for LDAP in Europe. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Windows MDM Agent Download"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

We are continuing to work on a fix for this issue.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently investigating an issue with Windows MDM failing to download the agent. We will update this issue as we know more.

Report: "Increased error rates with JumpCloud Go Registration"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

We've identified the issue and are working on a fix. Customers experiencing this issue can re-try the registration attempt and the request should eventually be successful.

investigating

We are investigating increased errors with a service responsible for managing our token service which may cause issues for some users with registering JumpCloud Go. We will update this issue as we know more.

Report: "Increased Error Rate with Directory Service"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

The issue has been identified and a fix is being implemented.

investigating

We're currently investigating reports of degraded performance or intermittent synchronization issues with JumpCloud's Directory Services. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Policy propagation delay"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We are currently investigating an issue with the deployment of policies to macOS, Windows and Linux devices.

Report: "Propagation delay with Directory Insights events"

Last update
resolved

This incident has been resolved.

monitoring

We are continuing to monitor for any further issues.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently investigating an issue with propagation delays with Directory Insights events. We will update this issue as we know more.

Report: "Increased Error Rate with Directory Service"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We're currently investigating reports of degraded performance or intermittent synchronization issues with JumpCloud's Directory Services. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Premium Chat Support Outage"

Last update
resolved

This issue has been resolved and our Premium Chat Support is fully functional at this time.

monitoring

A fix has been implemented and we are seeing recovery across our Premium Chat support platform.

investigating

We are currently experiencing issues with our Premium Support Chat tool. This is preventing us from replying to chat requests. We are working with the vendor to get this resolved as quickly as possible. Customers can still reach JumpCloud support via Premium Phone Support or by submitting a case via email or through the admin portal. Details on how to contact support can be found here; https://jumpcloud.com/support/contact-jumpcloud-support

Report: "Insights Reporting Outage"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

We're investigating reports of degraded performance with JumpCloud's Insights reporting. The cause of the issue has been identified, and this status message will be updated once resolved.

Report: "Apple MDM Commands"

Last update
resolved

This incident has been resolved.

identified

We have identified and are working on an incident where a small subset of customers may experience errors sending MDM commands to devices, or retrieving results.

Report: "Degraded Website"

Last update
resolved

This incident has been resolved.

identified

The issue has been identified and a fix is being implemented.

investigating

We're currently investigating reports of degraded performance or intermittent connection issues on jumpcloud.com. We are investigating the cause of the issues currently, and will update the status event once resolved. Note that the JumpCloud Admin Console & User Portal are operational.

Report: "Premium Chat Support Outage"

Last update
resolved

This issue has been resolved and our Premium Chat Support is fully functional at this time.

monitoring

A fix has been implemented and we are seeing recovery across our Premium Chat support platform.

investigating

We are currently experiencing issues with our Premium Support Chat tool. This is preventing us from replying to chat requests. We are working with the vendor to get this resolved as quickly as possible. Customers can still reach JumpCloud support via Premium Phone Support or by submitting a case via email or through the admin portal. Details on how to contact support can be found here; https://jumpcloud.com/support/contact-jumpcloud-support

Report: "RADIUS configuration propagation delays"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results. RADIUS server configuration propagation should catch up shortly.

identified

The issue has been identified and a fix is being implemented.

investigating

We are investigating an issue with propagation delays specific to configuration changes with RADIUS servers. RADIUS authentication is not impacted.

Report: "Increased error rates with Software Management"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently experiencing an increase in error rates when modifying and saving an existing software application. The creation of new applications appear unaffected at this time. We will update this incident as we know more.

Report: "Increased error rates with Password Manager"

Last update
resolved

This incident has been resolved.

identified

We are continuing to work on a fix for this issue.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently investigating an issue with increased error rates for Password Manager. Password Manager may not be loading correctly in the Admin Portal, and end users may not be able to sync passwords or save new items. We will update this issue as soon as we have more information.

Report: "Password Manager Chrome Extension"

Last update
resolved

This incident has been resolved.

monitoring

We've released a new version (v2.0.12.1) of the Password Manager Chrome Extension which should download shortly. If it doesn't happen automatically, customers can prompt updates by going to chrome://extensions, hitting "Developer Mode", and hitting the "Update" button.

investigating

The latest Chrome update may be conflicting with the JumpCloud Password Manager Chrome Extension on certain websites. If you are experiencing performance issues with Chrome, you may need to disable the Password Manager Chrome Extension, use Chrome in incognito mode, or use another browser until we are able to provide a solution for this issue. We are working on a fix and will provide an update as soon as possible.

Report: "Admin Portal login issues with Chrome version 129"

Last update
resolved

The incident has been resolved. It's possible users may experience slower load times of the Admin Portal temporarily while the team investigates other opportunities around the change Chrome version 129 has introduced.

monitoring

A fix has been implemented and we are monitoring the results.

identified

We have identified the changes in Chrome to cause the issue with loading the Admin Portal and are working on implementing a fix for this.

investigating

We are currently investigating an issue with the latest Chrome release of version 129 causing failed logins to the Admin Portal. Firefox, Safari, and other browsers including Mobile App for Admin work successfully at this time. We will update this issue as we know more.

Report: "Connectivity issues with the Console Service for Admins"

Last update
resolved

An intermittent connectivity issue with JumpCloud's Console Service for administrator and user login at https://console.jumpcloud.com has been addressed by our CDN vendor. All operations have returned to normal, and the issue is currently considered resolved.

monitoring

CloudFlare, our CDN vendor, has applied a fix and the Admin console is fully operational now. We continue to monitor the situation.

investigating

We're currently seeing degraded performance or intermittent connectivity issues with JumpCloud's Console Service for administrator and user login at https://console.jumpcloud.com/. Degradation of performance of their CDN at the vendor has been identified to be the cause and we are waiting on updates from the vendor.

Report: "Increased error rates on policies"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We are currently seeing an increase in error rates on policies. Some customers may see an error "Unable to fetch policies!"

Report: "Active Directory Integration Propagation Delays"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We are investigating an issue with propagation delays between the ADI agent and JumpCloud. We will update this issue when we have more information.

Report: "Degraded PUSH Service iOS"

Last update
postmortem

### **JumpCloud Incident Report** **Date**: 2024-08-23 **Date of Incident**: 2024-08-20 **Description**: RCA for JumpCloud Push Notifications ‌ **Summary:** On August 20th, at 3:46 AM Mountain Time, the APNs certificate attached to the AWS SNS Platform Application for Apple expired, causing Apple devices to fail to receive or acknowledge push notifications. Additionally, new device registrations began failing. Already registered devices could authenticate using the TOTP code in the JumpCloud Protect app. The on-call team was paged, and the engineer started investigating. An internal incident was called at 4:31 AM, and responders from different teams began triaging MFA failures. The team identified the errors from SNS and escalated for additional support at 4:53 AM. At 5:25 AM, the team attempted a manual rotation of the certificate in SNS, but due to access restrictions, IaC configuration was needed. This discovery and limitation delayed the overall recovery window. By 5:59 AM, the Notification Service had uptaken the new APNs certificate, and a rolling restart was initiated. The APNs certificate was updated in the AWS SNS Platform Application by 6:10 AM, and push notifications began working again. ‌ **Root Cause:** The root cause of the incident was the expiration of the APNs certificate. This led to the failure of Apple devices to receive or acknowledge push notifications and the failure of new device registrations. ‌ **Corrective and Preventative Actions:** **Immediate Corrective Actions:** * Manual rotation of the expired APNs certificate in the JumpCloud Notification Service. * Update of the APNs certificate in AWS SNS Platform Application. **Preventative Actions:** * Implement monitoring to alert the team well in advance of certificate expiration dates for SNS Platform Applications. * Review all critical certificates to ensure monitoring coverage. * Automate the certificate renewal process where possible to reduce the risk of human error. * Conduct training sessions for the team on handling certificate expirations and renewals.

resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

We're currently investigating reports of degraded performance or intermittent connectivity issues with JumpCloud's PUSH Services on iOS.

Report: "New applications failing to install from Microsoft Store App"

Last update
resolved

This incident has been resolved and this function available for use.

identified

Creation of new Microsoft store applications is currently unavailable due to deprecation of service from Microsoft. Existing Microsoft store applications are unaffected and will continue to install/update. Further, existing JumpCloud managed Microsoft store applications may be edited and/or device associations changes and will continue to work as expected. For new Microsoft store applications, our team is actively working to support an alternative service and expect to have this available ASAP. Thank you for your patience as we work to restore this functionality.

investigating

Microsoft is currently experiencing issues with an endpoint used to install new applications using the Microsoft store app. We are working to regain access, and will update this issue as we know more.

Report: "Increased error rates on some provisioning and enrollment services"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

Some customers may experience provisioning or enrollment issues and see a generic "identity provider error". We've identified this issue and are in the process of implementing a fix. We will update this issue as we know more.

Report: "Remote Assist Degraded Performance"

Last update
resolved

This incident has been resolved.

monitoring

We are continuing to monitor for any further issues.

monitoring

A fix has been implemented and we are monitoring the results.

identified

The issue has been identified and a fix is being implemented.

investigating

Launching Remote Assist in incognito mode or clearing the browser cache may be a temporary workaround for some customers.

investigating

We are currently investigating an issue with Remote Assist connections

Report: "iOS and Android Admin App degradation"

Last update
resolved

A new version of the Admin app is available for both iOS and Android.

identified

A new version of the Android Admin application is available for download which should solve this issue. The iOS version should be available for download shortly.

identified

The issue has been identified and a fix is being implemented.

investigating

We are currently investigating an issue with the JumpCloud iOS and Android Admin application.

Report: "Google Workspace Sync issues"

Last update
postmortem

**Date**: 2024-06-21 **Date of Incident**: 2024-06-05 **Description**: RCA for Google Apps Directory Dispatch Delay ‌ **Summary:** At approximately 20:30 MDT on 2024-06-05, JumpCloud received a large ingress of messages in a Google Apps FIFO queue.  By 21:40 MDT on 2024-06-05 this exceeded 20,000 messages causing processing delays for some customers.  At 21:24 on 2024-06-05 an alert fired for this delay, but was incorrectly labeled as a non-production issue, causing it to be misrouted.  At 07:15 MDT on 2024-06-06 the root cause was identified and a diversion queue was constructed where those messages were moved for processing.  The processing delay lasted until approximately 11:30 MDT on 2024-06-06. ‌ **Root Cause:** A contiguous block of messages larger than 50,000 from a single organization was sent to the main Google Apps FIFO queue.  Normally this would initiate a diversion queue construct prior to 20,000 messages, but was missed due to an incorrect alerting change during work in the Google Apps application layer. This FIFO queue is partitioned by organization ID, and once the limit of 20,000 messages is reached, only one message at a time can be processed regardless of the number of available worker threads. ‌ #### **Contributing Factors** * **Monitoring Gaps**: Lack of effective monitoring and alerting for this queue and processing latency. * **Scaling Issues**: Workers were scaled vertically but not timely enough to handle the sudden spike in queue size. * **Delay Building Diversion Queue**: Unforeseen issues requiring manual changes extending the time to completion for the diversion queue. #### **Immediate Actions Taken** 1. **Scaling Up**: Increased the number of worker instances to process the backlog of messages. 2. **Configuration Adjustments**: Reviewed and adjusted the FIFO queue and worker settings for optimal performance. 3. **Diversion Queue**: Diversion queue created for influx of messages. #### **Long-term Corrective Actions** 1. **Automate Message Diversion**: Review and optimize diversion queue policies ensuring rapid queue build. 2. **Monitoring and Alerts**: Review and increase comprehensive monitoring and alerting mechanisms for early detection of queue build-ups and processing delays. 3. **Documentation and Training**: Document the incident and update operational runbooks.

resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

We are continuing to work on a fix for this issue.

identified

We have identified the issue and are working on a solution.

investigating

We have received reports that synchronization of user information between JumpCloud and Google Workspace is not occurring as expected. We are investigating these reports.

Report: "Cloud directory integration degradation"

Last update
resolved

This incident has been resolved.

monitoring

The issue has been identified and a fix implemented. We are continuing to monitor this issue.

identified

We are continuing to investigate this issue and work towards a resolution.

identified

The issue has been identified and a fix has been implemented.

investigating

We are investigating an issue with our cloud directory integration service.

Report: "Degraded Agent Service"

Last update
resolved

This incident has been resolved.

investigating

We're currently investigating edge cases of failed logins on devices. We are investigating the cause of the issues currently, and will update the status event once resolved.

Report: "Policy results delayed"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We are currently experiencing a delay in reporting the results of policies that have been applied to devices. This is under investigation.

Report: "JumpCloud User Portal - Increased Error Rates"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We are seeing an increase in error rates on JumpCloud's User Portal which may be causing login issues for some users. We will update this incident as we know more.

Report: "Chat Support is not available"

Last update
resolved

This issue has been resolved and our Premium Chat Support is fully functional at this time.

monitoring

We are continuing to monitor for any further issues.

monitoring

A fix has been implemented and we are seeing recovery across our Premium Chat support platform.

identified

We have identified an issue with our Premium Chat support platform. Responses in chat will be slow. Customers are encouraged to submit tickets through the administration console. Details on alternate methods can be found in this Help Center article: https://jumpcloud.com/support/contact-jumpcloud-support

Report: "Premium Chat Support Outage"

Last update
resolved

This issue has been fully resolved. We do not expect any additional interrupts in service.

identified

Customers can still reach JumpCloud support via Premium Phone Support or by submitting a case via email or through the admin portal. Details on how to contact support can be found here; https://jumpcloud.com/support/contact-jumpcloud-support

identified

We are currently experiencing issues with our Premium Support Chat tool. This is preventing us from replying to chat requests. We are working with the vendor to get this resolved as quickly as possible.

Report: "Admin Portal - Password Manager degraded performance"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring results.

investigating

We are currently investigating an issue with the Password Manager module in the Admin Console.

Report: "Admin Console UI - issue with pulling up existing user and device groups"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

identified

We have identified the issue and a fix is being evaluated.

investigating

We continue to investigate the cause of the issue currently and will update the status event once resolved.

investigating

We are currently investigating an issue with the Admin console UI when pulling up existing user and device groups.

Report: "Increased error rates on Admin Portal"

Last update
resolved

This incident has been resolved.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We are currently investigating increased error rates and failures to load the Admin Portal. We will update this incident as we know more.

Report: "Password Manager Increased Error Rates"

Last update
resolved

This incident has been resolved.

monitoring

We are continuing to monitor for any further issues.

monitoring

A fix has been implemented and we are monitoring the results.

investigating

We are currently experiencing increased error rates with Password Manager backend systems. We will update this issue as we know more.