Uploaded image for project: 'Atlassian Guard'
  1. Atlassian Guard
  2. ACCESS-1025

Allow trello.com to be used as a relay state URL for IDP-initiated log-in

    • 19
    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      When configuring SAML single sign-on, if the user uses URLs like https://id.atlassian.com, https://start.atlassian.com, and https://example.atlassian.net, this will allow people added to the identity provider to log-in via IDP-initiated log-in to Atlassian products and the account.

      However, if the https://trello.com URL is used as the relay state, this will not authenticate the user to Trello and will require the account to use the Log-in flow, even though it is already authenticated to the Atlassian account.

      Suggestion

      This is a suggestion to allow https://trello.com to be used as the relay state, automatically authenticating accounts, as it would happen with https://id.atlassian.com

      Workaround

      Add the following URL to the Relay state configuration of the identity provider:

      https://trello.com/ensureSession

      This will automatically log the user to Trello.

            [ACCESS-1025] Allow trello.com to be used as a relay state URL for IDP-initiated log-in

            Leonardo H made changes -
            Labels New: guard-s8
            SET Analytics Bot made changes -
            Support reference count Original: 18 New: 19
            SET Analytics Bot made changes -
            Support reference count Original: 17 New: 18
            SET Analytics Bot made changes -
            Support reference count Original: 16 New: 17
            SET Analytics Bot made changes -
            Support reference count Original: 15 New: 16
            Roman P made changes -
            Link New: This issue follows ACCESS-830 [ ACCESS-830 ]
            Cody Curry made changes -
            Description Original: When [configuring SAML single sign-on|https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-an-identity-provider/], if the user uses URLs like https://id.atlassian.com, https://start.atlassian.com, and https://example.atlassian.net, this will allow people added to the identity provider to log-in via IDP-initiated log-in to Atlassian products and the account.

            However, if the https://trello.com URL is used as the relay state, this will not authenticate the user to Trello and will require the account to use the *Log-in* flow, even though it is already authenticated to the Atlassian account.

            h3.Suggestion

            This is a suggestion to allow https://trello.com to be used as the *relay state*, automatically authenticating accounts, as it would happen with https://id.atlassian.com

            h3.Workaround

            Add the following URL to the *Relay state* configuration of the identity provider:

            https://trello.com/appSwitcherLogin

            This will automatically log the user to Trello.
            New: When [configuring SAML single sign-on|https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-an-identity-provider/], if the user uses URLs like [https://id.atlassian.com|https://id.atlassian.com/], [https://start.atlassian.com|https://start.atlassian.com/], and [https://example.atlassian.net|https://example.atlassian.net/], this will allow people added to the identity provider to log-in via IDP-initiated log-in to Atlassian products and the account.

            However, if the [https://trello.com|https://trello.com/] URL is used as the relay state, this will not authenticate the user to Trello and will require the account to use the *Log-in* flow, even though it is already authenticated to the Atlassian account.
            h3. Suggestion

            This is a suggestion to allow [https://trello.com|https://trello.com/] to be used as the {*}relay state{*}, automatically authenticating accounts, as it would happen with [https://id.atlassian.com|https://id.atlassian.com/]
            h3. Workaround

            Add the following URL to the *Relay state* configuration of the identity provider:

            https://trello.com/ensureSession

            This will automatically log the user to Trello.
            SET Analytics Bot made changes -
            Support reference count Original: 14 New: 15
            SET Analytics Bot made changes -
            Support reference count New: 14

            Larry added a comment -

            I should also add that I cannot have both the Atlassian Cloud Azure AD enterprise app and also add a Trello-specific SAML SSO app, because they would have to both share an Entity ID, and would have different certificates. I don't think it's currently possible to keep both apps in one Azure AD.

            Larry added a comment - I should also add that I cannot have both the Atlassian Cloud Azure AD enterprise app and also add a Trello-specific SAML SSO app, because they would have to both share an Entity ID, and would have different certificates. I don't think it's currently possible to keep both apps in one Azure AD.

              Unassigned Unassigned
              gdecampos Giuliano C.
              Votes:
              6 Vote for this issue
              Watchers:
              12 Start watching this issue

                Created:
                Updated: