• Icon: Suggestion Suggestion
    • Resolution: Fixed
    • None
    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      Atlassian Cloud SAML single sign-on

      SAML single sign-on is available as part of Identity Manager. More information about Identity Manager.
       
      Read up on how to configure SAML single sign-on for our Cloud products.
       
      Thanks for all of your feedback and discussion on this ticket. We'll continue to monitor and respond to it, as well as take on board your requests for future enhancements.
       
      We receive a lot of requests for new features and improvements, so if you'd like to better understand how we make roadmap decisions, please read: https://confluence.atlassian.com/display/DEV/Implementation+of+New+Features+Policy

        1. transform.PNG
          transform.PNG
          23 kB
        2. screenshot-1.png
          screenshot-1.png
          49 kB
        3. SAC.PNG
          SAC.PNG
          12 kB
        4. image-2017-02-21-23-25-35-930.png
          image-2017-02-21-23-25-35-930.png
          51 kB
        5. image005.png
          image005.png
          10 kB
        6. image004.png
          image004.png
          14 kB
        7. image003.png
          image003.png
          11 kB
        8. image001.png
          image001.png
          11 kB
        9. Identifiers.PNG
          Identifiers.PNG
          15 kB
        10. fields.PNG
          fields.PNG
          20 kB
        11. endpoint.PNG
          endpoint.PNG
          15 kB
        12. Claims.PNG
          Claims.PNG
          15 kB
        13. 2016-12-06_09-33-39.jpg
          2016-12-06_09-33-39.jpg
          78 kB
        14. 02111600.JPG
          02111600.JPG
          194 kB

            [ID-80] Support SAML integration with Cloud apps

            Hi all,

            Atlassian added the documentation Configure SAML single sign-on with Active Directory Federation Services (AD FS) with instructions to integrate with ADFS and the page SAML single sign-on has been updated.

            Gabriel
            Atlassian Support

            Gabriel Muller (Inactive) added a comment - Hi all, Atlassian added the documentation  Configure SAML single sign-on with Active Directory Federation Services (AD FS) with instructions to integrate with ADFS and the page SAML single sign-on has been updated. Gabriel Atlassian Support

            Michael Adam added a comment - - edited

            I have SSO working with AD FS 2.0

            Hopefully these update screenshots will help - it looks like things have changed since the post in Dec 2016.

            Enter on Atlassian side

            Identity provider Entity ID:

            http://adfs-server.domain.com/adfs/services/trust

            Identity provider SSO URL:

            https://adfs-server.domain.com/adfs/ls/

            Public x509 certificate:

            Export your Token-signing certificate as base 64 (how to get from AD FS 2.0 console: AD FS 2.0 -> Service -> Certificates)

             

            Enter on AD FS 2.0 side

            There are only 2 tabs that you need to populate with information - Identifiers and Endpoints but I've included screenshots for everything.

             

            Edit: looks like I can't upload new screenshots.

            In short, I used these values:

            Identifiers tab:

            Relying party identifier: SP Entity ID from sso config page on admin.atlassian.com

            (eg: https://auth.atlassian.com/saml/hex-string)

             

            Endpoints Tab: SAML Assertion Consumer Endpoint: SP Assertion Consumer Service URL from sso config page on admin.atlassian.com (eg: https://auth.atlassian.com/login/callback?connection=saml-hex-string)

             

            Advanced Tab: [default - SHA-265]

             

            Don't forget about the claims rules (see screenshot from Dec 2016 post)

             

             

             

             

             

             

             

            Claim rules are the same as the earlier post:

             

             

             

             

             

             

            Michael Adam added a comment - - edited I have SSO working with AD FS 2.0 Hopefully these update screenshots will help - it looks like things have changed since the post in Dec 2016. Enter on Atlassian side Identity provider Entity ID: http://adfs-server.domain.com/adfs/services/trust Identity provider SSO URL: https://adfs-server.domain.com/adfs/ls/ Public x509 certificate: Export your Token-signing certificate as base 64 (how to get from AD FS 2.0 console: AD FS 2.0 -> Service -> Certificates)   Enter on AD FS 2.0 side There are only 2 tabs that you need to populate with information - Identifiers and Endpoints but I've included screenshots for everything.   Edit: looks like I can't upload new screenshots. In short, I used these values: Identifiers tab: Relying party identifier: SP Entity ID from sso config page on admin.atlassian.com (eg: https://auth.atlassian.com/saml/hex-string)   Endpoints Tab: SAML Assertion Consumer Endpoint:  SP Assertion Consumer Service URL  from sso config page on admin.atlassian.com (eg:  https://auth.atlassian.com/login/callback?connection=saml-hex-string)   Advanced Tab: [default - SHA-265]   Don't forget about the claims rules (see screenshot from Dec 2016 post)               Claim rules are the same as the earlier post:            

            Ra maader cood kankemaager pola R a

            Saiful Islam added a comment - Ra maader cood kankemaager pola R a

            mchyzer2 added a comment -

            Once you register a domain for SSO, any user who self identifies (or has self identified) their email address as having that domain (exact domain, not subdomain), is now in your access management / SSO cohort...

            mchyzer2 added a comment - Once you register a domain for SSO, any user who self identifies (or has self identified) their email address as having that domain (exact domain, not subdomain), is now in your access management / SSO cohort...

            We are also a higher ed org and have the same problem with Atlassian Access. We are hopeful that in the future there will be a way to identify just those sites that we'd like included in our Atlassian Access subscription. It seems like a number of students in our computer science courses use Atlassian cloud products, which is great! I'm all for sending students off into the work place knowing how to navigate a Jira project. But the University IT department doesn't want to pay for SSO for them, only for our centrally supported site and our dev site. 

            Someone from Atlassian called us to discuss this issue, which helped us understand it, but she hasn't responded to my emails since. I would be more than happy to discuss this higher ed use case further as it is a major blocker for our implementation of Jira Service Desk. 

            Eleanor Hart added a comment - We are also a higher ed org and have the same problem with Atlassian Access. We are hopeful that in the future there will be a way to identify just those sites that we'd like included in our Atlassian Access subscription. It seems like a number of students in our computer science courses use Atlassian cloud products, which is great! I'm all for sending students off into the work place knowing how to navigate a Jira project. But the University IT department doesn't want to pay for SSO for them, only for our centrally supported site and our dev site.  Someone from Atlassian called us to discuss this issue, which helped us understand it, but she hasn't responded to my emails since. I would be more than happy to discuss this higher ed use case further as it is a major blocker for our implementation of Jira Service Desk. 

            Is there option to only bring in certain domain users, like from a certain OU or any way to filter for only a certain set of domain users?

            Like you we have over 600 staff but only a small set use Jira.

            Niall Hannon added a comment - Is there option to only bring in certain domain users, like from a certain OU or any way to filter for only a certain set of domain users? Like you we have over 600 staff but only a small set use Jira.

            mchyzer2 added a comment -

            this issue is closed as "wont fix", so you cant vote for it

            https://jira.atlassian.com/browse/ACCESS-37

             

            mchyzer2 added a comment - this issue is closed as "wont fix", so you cant vote for it https://jira.atlassian.com/browse/ACCESS-37  

            mchyzer2 added a comment -

            Yes!  Ridiculous right??    I registered @upenn.edu.  Single sign on worked.  I dont like that I have to pay for 600 users to SSO, but whatever.  Then I got a notification from our business school.   "Why are half of our users now mysteriously using SSO??"   Uh... anyone with @upenn.edu is now SSO.  Thats ok too, perhaps a feature, except that now we own those accounts and have some control over them.  But then they are on our IAM bill paying per month per user even though they arent in our Jira/Confluence cloud site.  And other alumni who are in random sites are now SSO and we pay for it.  Thats another 600 users right now, and will grow (uncontrolled by us)  Can we charge the other departments back?  No, they didnt ask for it.  Should we have to pay?  No.  So now we can either turn off SSO which we dont want to do.  Or go back to on prem and save 30k per year and have more user licenses (cloud doesnt have edu discount).  Twist my arm...

            mchyzer2 added a comment - Yes!  Ridiculous right??     I registered @upenn.edu.  Single sign on worked.  I dont like that I have to pay for 600 users to SSO, but whatever.  Then I got a notification from our business school.   "Why are half of our users now mysteriously using SSO ??"   Uh... anyone with @upenn.edu is now SSO.  Thats ok too, perhaps a feature, except that now we own those accounts and have some control over them.  But then they are on our IAM bill paying per month per user even though they arent in our Jira/Confluence cloud site.  And other alumni who are in random sites are now SSO and we pay for it.  Thats another 600 users right now, and will grow (uncontrolled by us)  Can we charge the other departments back?  No, they didnt ask for it.  Should we have to pay?  No.  So now we can either turn off SSO which we dont want to do.  Or go back to on prem and save 30k per year and have more user licenses (cloud doesnt have edu discount).  Twist my arm...

            Hi Chris\Elanor,

            Can you just explain what you mean by "Now users who use our domain in their email are on our bill" ?

            So if you set up SSO and add your domain it charges you for all your domain users and not just the ones that actually have a login for JIRA\Jira Service Desk etc?

            Thanks

            Niall

            Niall Hannon added a comment - Hi Chris\Elanor, Can you just explain what you mean by "Now users who use our domain in their email are on our bill" ? So if you set up SSO and add your domain it charges you for all your domain users and not just the ones that actually have a login for JIRA\Jira Service Desk etc? Thanks Niall

            The issue that Chris identified is one of our primary concerns with Atlassian Access. Until this issue is resolved we won't be able to use it because we won't be able to control our bill at all. Pretty please resolve this billing issue! It's embarrassing to have a Help Center that's not behind SSO for the department that brings our larger organization SSO.

            Eleanor Hart added a comment - The issue that Chris identified is one of our primary concerns with Atlassian Access. Until this issue is resolved we won't be able to use it because we won't be able to control our bill at all. Pretty please resolve this billing issue! It's embarrassing to have a Help Center that's not behind SSO for the department that brings our larger organization SSO.

              Unassigned Unassigned
              dwierzbicka Dobroslawa Wierzbicka (Inactive)
              Votes:
              473 Vote for this issue
              Watchers:
              380 Start watching this issue

                Created:
                Updated:
                Resolved: