Configuring SAML SSO with Jira/Confluence and PingFederate
Learn how to configure SAML single sign-on with Jira/Confluence on premise and PingFederate.
About this task
The following table details the required and optional attributes to be configured in the assertion attribute contract.
Attribute Name | Description | Required / Optional |
---|---|---|
SAML_SUBJECT |
Username |
Required |
Create a PingFederate SP Connection for Jira/Confluence
The following configuration is untested and is provided as an example. Additional steps might be required. |
-
Sign on to Atlassian application as an administrator and go to Administration → System → SAML Authentication.
-
Select SAML Single Sign Onand note the Audience URL (Entity ID) and Assertion Consumer Service URL values.
-
Download the signing certificate.
-
Sign on to the PingFederate administrative console.
-
Using the details retrieved from the Atlassian application UI:
-
Configure using Browser SSO profile SAML 2.0.
-
Enable IdP-Initiated SSO and SP Initiated SSO.
-
In Assertion Creation: Attribute Contract, set the Subject Name Format to
urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
. -
In the Assertion Creation: Attribute Contract Fulfilment, map the attribute SAML_SUBJECT to the attribute username.
-
In Protocol Settings: Allowable SAML Bindings, enable Post and Redirect.
-
-
Export the metadata for the newly-created SP connection.
-
Export the signing certificate public key.
Configure the PingFederate IdP connection for Jira/Confluence on premise
-
Sign on to Atlassian application as an administrator and go to Administration → System → SAML Authentication.
-
Select SAML Single Sign-On.
-
Configure the following.
Setting Value Single sign-on issuer
The issuer ID for your PingFederate instance. You can retrieve this from the metadata that you downloaded.
Identity provider single sign-on URL
The PingFederate SingleSignOnService URL. You can retrieve this from the metadata that you downloaded. For example,
https://hostname:port/idp/SSO.saml2
X509 Certificate
Upload the PingFederate signing public certificate.
Login Mode
Choose whether SAML is primary or secondary authentication.
Configuration is complete.