You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/jiramicrosoft-tutorial.md
+34-20Lines changed: 34 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 09/23/2022
12
+
ms.date: 11/11/2022
13
13
ms.author: dhivyag
14
14
---
15
15
@@ -30,7 +30,7 @@ Use your Microsoft Azure Active Directory account with Atlassian JIRA server to
30
30
To configure Azure AD integration with JIRA SAML SSO by Microsoft, you need the following items:
31
31
32
32
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
33
-
- JIRA Core and Software 6.4 to 9.1.0 or JIRA Service Desk 3.0 to 4.22.1 should installed and configured on Windows 64-bit version.
33
+
- JIRA Core and Software 6.4 to 8.22.1 or JIRA Service Desk 3.0 to 4.22.1 should be installed and configured on Windows 64-bit version.
34
34
- JIRA server is HTTPS enabled.
35
35
- Note the supported versions for JIRA Plugin are mentioned in below section.
36
36
- JIRA server is reachable on the Internet particularly to the Azure AD login page for authentication and should able to receive the token from Azure AD.
@@ -51,7 +51,7 @@ To get started, you need the following items:
51
51
52
52
## Supported versions of JIRA
53
53
54
-
* JIRA Core and Software: 6.4 to 9.1.0
54
+
* JIRA Core and Software: 6.4 to 8.22.1.
55
55
* JIRA Service Desk 3.0 to 4.22.1.
56
56
* JIRA also supports 5.2. For more details, click [Microsoft Azure Active Directory single sign-on for JIRA 5.2](jira52microsoft-tutorial.md).
57
57
@@ -102,50 +102,64 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
102
102
103
103
1. On the **Basic SAML Configuration** section, perform the following steps:
104
104
105
-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
106
-
`https://<domain:port>/plugins/servlet/saml/auth`
107
-
108
-
b. In the **Identifier** box, type a URL using the following pattern:
105
+
a. In the **Identifier** box, type a URL using the following pattern:
109
106
`https://<domain:port>/`
110
107
111
-
c. In the **Reply URL** text box, type a URL using the following pattern:
108
+
b. In the **Reply URL** text box, type a URL using the following pattern:
109
+
`https://<domain:port>/plugins/servlet/saml/auth`
110
+
111
+
a. In the **Sign-on URL** text box, type a URL using the following pattern:
112
112
`https://<domain:port>/plugins/servlet/saml/auth`
113
113
114
114
> [!NOTE]
115
-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
115
+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-on URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
116
116
117
117
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
118
118
119
119

120
120
121
121
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
122
122
123
-
> [!div class="mx-imgBorder"]
124
-
> 
123
+

125
124
126
125
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
127
126
128
-
> [!div class="mx-imgBorder"]
129
-
> 
127
+

130
128
131
129
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
132
130
133
-
> [!div class="mx-imgBorder"]
134
-
> 
131
+

135
132
136
133
c. The selection can then be saved by clicking on the Save button at the top.
137
134
138
-
> [!div class="mx-imgBorder"]
139
-
> 
135
+

140
136
141
137
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
142
138
143
-
> [!div class="mx-imgBorder"]
144
-
> 
139
+

145
140
146
141
> [!NOTE]
147
142
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
148
143
144
+
1. If your Azure tenant has **guest users** then follow the below configuration steps:
145
+
146
+
a. Click on **pencil** icon to go to the Attributes & Claims section.
147
+
148
+

149
+
150
+
b. Click on **NameID** on Attributes & Claims section.
151
+
152
+

153
+
154
+
c. Setup the claim conditions based on the User Type.
155
+
156
+

157
+
158
+
>[!NOTE]
159
+
> Give the NameID value as `user.userprinciplename` for Members and `user.mail` for External Guests.
160
+
161
+
d. **Save** the changes and verify the SSO for external guest users.
162
+
149
163
### Create an Azure AD test user
150
164
151
165
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -235,7 +249,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
235
249
> To enable the default login form for admin login on login page when force azure login is enabled, add the query parameter in the browser URL.
0 commit comments