Configuring SAML SSO with Atlassian Cloud and PingFederate
About this task
The following table details the required and optional attributes to be configured in the assertion attribute contract.
Attribute Name | Description | Required / Optional |
---|---|---|
|
Email Address |
Required |
|
First Name |
Required |
|
Surname |
Required |
|
ID (not email) |
Required |
The following table details the references that are used within this guide that are environment specific. Replace these with the suitable value for your environment.
Reference | Description |
---|---|
TenantSSOID |
Tenant single sign-on (SSO) ID, retrieved from Atlassian Cloud SAML Single Sign-on configuration as part of EntityID and Assertion Consumer Service (ACS) URL. |
Create a PingFederate SP connection for Atlassian Cloud
The following configuration is untested, and is provided as an example. Additional steps might be required. |
-
In Atlassian Cloud, go to Security → SAML Single Sign-on and sign on to Atlassian Cloud as an administrator.
-
Make a note of the Entity ID and ACS URL values.
You will need these later.
-
Sign on to the PingFederate administrative console.
-
Using the details retrieved from the application UI:
-
Configure using Browser SSO profile SAML 2.0.
-
Enable the IDP-Initiated SSO SAML profile.
-
Enable the SP Initiated SSO SAML profile.
-
In Assertion Creation → Attribute Contract, set the Subject Name Format to
urn:oasis:names:tc:SAML:2.0:attrname-format:emailAddress
. -
Add the following attributes as type
urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
:-
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
-
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
-
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
-
-
In Assertion Creation → Attribute Contract Fulfilment:
-
Map attribute SAML_SUBJECT to the attribute mail.
-
Map attribute givenname to the attribute givenName.
-
Map attribute surname to the attribute sn.
-
Map attribute name to the non-email unique identifier, such as uid.
-
-
In Protocol Settings:
-
For Assertion Consumer Service URL, enter the consumer service URL retrieved from Atlassian and configure as index 0.
-
For Allowable SAML Bindings, enable Redirect and POST.
-
-
-
Export the signing certificate public key.
Configure the PingFederate IdP connection for Atlassian Cloud
The following configuration is untested and is provided as an example. Additional steps might be required. |
-
Sign in to Atlassian Cloud as an administrator.
-
Go to Security → SAML Single Sign-on.
-
Click Add SAML Configuration.
-
Enter the following details:
-
In the Identity Provider Entity ID field, enter the Issuer value for your PingFederate environment configuration.
-
In the Identity Provider SSO URL field, enter the SSO URL for your PingFederate environment configuration.
-
In a text editor, open the certificate you downloaded during the PingFederate and paste the contents of the certificate into the Public x509 Certificate field.
-
-
Click Save Configuration.