-
Suggestion
-
Resolution: Fixed
NOTE: This suggestion is for JIRA Service Desk Server. Using JIRA Service Desk Cloud? See the corresponding suggestion.
We use a custom Seraph authenticator / Seraph config to authenticate users against an external Single Sign On process to log in to our JIRA instance.
Standard pages within JIRA (e.g., browsing to a specific issue) correctly respect the Seraph config and redirect unauthenticated users according to the Seraph login.url1 parameter.
Service Desk does not respect this parameter, and instead, prompts unauthenticated users to log in via it's own custom login page (e.g., <server>/servicedesk/customer/portal/1/user/login).
This is problematic for us. Our users who land on the Service Desk provided login page are stuck; their accounts in JIRA do not have passwords set up, so they can never successfully login on this page.
Steps to reproduce expected behavior:
1. Configure JIRA to use a seraph-config.xml Seraph configuration that includes a value for the login.url parameter.
2. Be logged OUT of JIRA.
3. Browse to a secure page not provided by Service Desk, e.g., <server>/browse/DESK-2.
4. Notice that JIRA redirects you to the login page provided in the Seraph configuration
Steps to reproduce wrong behavior:
1. Configure JIRA to use a seraph-config.xml Seraph configuration that includes a value for the login.url parameter.
2. Be logged OUT of JIRA.
3. Browse to a secure page provided by Service Desk, e.g., <server>/servicedesk/customer/portal/1/DESK-2.
4. Notice that JIRA does not redirect you to the login page provided in the Seraph configuration
Attached, please find three screenshots:
- A snippet of our seraph-config.xml file
- Network activity when starting un-authenticated, going to a "standard" JIRA page, and having JIRA redirect the user according to the Seraph configuration
- Network activity when starting un-authenticated, going to a Service Desk provided page, and having JIRA (wrongly) redirect the user – not to the Seraph specified location – but to a custom Service Desk login page
- is related to
-
JSDSERVER-1551 You need to log in to Confluence to view Knowledge Base articles
- Closed
-
JSDSERVER-1244 Create a Crowd SSO authenticator that will allow Customers to be authenticated from the local directory
- Gathering Interest
-
JSDSERVER-1498 JIRA Service Desk Authentication Documentation
- Gathering Interest
- relates to
-
JSDCLOUD-1025 Service Desk login does NOT respect use of custom Seraph Authenticator
- Closed
Form Name |
---|
[JSDSERVER-1025] Service Desk login does NOT respect use of custom Seraph Authenticator
Workflow | Original: JAC Suggestion Workflow [ 3011907 ] | New: JAC Suggestion Workflow 3 [ 3650435 ] |
Status | Original: RESOLVED [ 5 ] | New: Closed [ 6 ] |
Workflow | Original: Confluence Workflow - Public Facing v4 [ 2665413 ] | New: JAC Suggestion Workflow [ 3011907 ] |
Workflow | Original: JSD Suggestion Workflow - TEMP [ 2324125 ] | New: Confluence Workflow - Public Facing v4 [ 2665413 ] |
Status | Original: Closed [ 6 ] | New: Resolved [ 5 ] |
Workflow | Original: JSD Suggestion Workflow [ 2052900 ] | New: JSD Suggestion Workflow - TEMP [ 2324125 ] |
Workflow | Original: JSD Suggestion Workflow - TEMP [ 2049511 ] | New: JSD Suggestion Workflow [ 2052900 ] |
Workflow | Original: JSD Suggestion Workflow [ 1279724 ] | New: JSD Suggestion Workflow - TEMP [ 2049511 ] |
Description |
Original:
We use a custom Seraph authenticator / Seraph config to authenticate users against an external Single Sign On process to log in to our JIRA instance.
Standard pages within JIRA (e.g., browsing to a specific issue) correctly respect the Seraph config and redirect unauthenticated users according to the Seraph {{login.url}}[^1^|https://docs.atlassian.com/atlassian-seraph/latest/configuration.html|] parameter. Service Desk does _not_ respect this parameter, and instead, prompts unauthenticated users to log in via it's own custom login page (e.g., {{<server>/servicedesk/customer/portal/1/user/login}}). This is problematic for us. Our users who land on the Service Desk provided login page are stuck; their accounts in JIRA do not have passwords set up, so they can never successfully login on this page.\\ \\ \\ Steps to reproduce *expected* behavior: 1. Configure JIRA to use a {{seraph-config.xml}} Seraph configuration that includes a value for the {{login.url}} parameter. 2. Be logged OUT of JIRA. 3. Browse to a secure page _not_ provided by Service Desk, e.g., {{<server>/browse/DESK-2.}} 4. Notice that JIRA redirects you to the login page provided in the Seraph configuration Steps to reproduce *wrong* behavior: 1. Configure JIRA to use a {{seraph-config.xml}} Seraph configuration that includes a value for the {{login.url}} parameter. 2. Be logged OUT of JIRA. 3. Browse to a secure page _provided by_ Service Desk, e.g., {{<server>/servicedesk/customer/portal/1/DESK-2}}. 4. Notice that JIRA does _not_ redirect you to the login page provided in the Seraph configuration\\ \\ \\ Attached, please find three screenshots: - A snippet of our {{seraph-config.xml}} file - Network activity when starting un-authenticated, going to a "standard" JIRA page, and having JIRA redirect the user according to the Seraph configuration - Network activity when starting un-authenticated, going to a Service Desk provided page, and having JIRA (wrongly) redirect the user -- not to the Seraph specified location -- but to a custom Service Desk login page |
New:
{panel:bgColor=#e7f4fa} *NOTE:* This suggestion is for *JIRA Service Desk Server*. Using *JIRA Service Desk Cloud*? [See the corresponding suggestion|http://jira.atlassian.com/browse/JSDCLOUD-1025]. {panel} We use a custom Seraph authenticator / Seraph config to authenticate users against an external Single Sign On process to log in to our JIRA instance. Standard pages within JIRA (e.g., browsing to a specific issue) correctly respect the Seraph config and redirect unauthenticated users according to the Seraph {{login.url}}[^1^|https://docs.atlassian.com/atlassian-seraph/latest/configuration.html|] parameter. Service Desk does _not_ respect this parameter, and instead, prompts unauthenticated users to log in via it's own custom login page (e.g., {{<server>/servicedesk/customer/portal/1/user/login}}). This is problematic for us. Our users who land on the Service Desk provided login page are stuck; their accounts in JIRA do not have passwords set up, so they can never successfully login on this page.\\ \\ \\ Steps to reproduce *expected* behavior: 1. Configure JIRA to use a {{seraph-config.xml}} Seraph configuration that includes a value for the {{login.url}} parameter. 2. Be logged OUT of JIRA. 3. Browse to a secure page _not_ provided by Service Desk, e.g., {{<server>/browse/DESK-2.}} 4. Notice that JIRA redirects you to the login page provided in the Seraph configuration Steps to reproduce *wrong* behavior: 1. Configure JIRA to use a {{seraph-config.xml}} Seraph configuration that includes a value for the {{login.url}} parameter. 2. Be logged OUT of JIRA. 3. Browse to a secure page _provided by_ Service Desk, e.g., {{<server>/servicedesk/customer/portal/1/DESK-2}}. 4. Notice that JIRA does _not_ redirect you to the login page provided in the Seraph configuration\\ \\ \\ Attached, please find three screenshots: - A snippet of our {{seraph-config.xml}} file - Network activity when starting un-authenticated, going to a "standard" JIRA page, and having JIRA redirect the user according to the Seraph configuration - Network activity when starting un-authenticated, going to a Service Desk provided page, and having JIRA (wrongly) redirect the user -- not to the Seraph specified location -- but to a custom Service Desk login page |
Link |
New:
This issue relates to |
Labels | Original: pm sdt | New: affects-server pm sdt |
Workflow | Original: TTT: Simple Issue Tracking Workflow [ 756711 ] | New: JSD Suggestion Workflow [ 1279724 ] |
Status | Original: Done [ 10044 ] | New: Closed [ 6 ] |