Skip to content

Commit 0971bd0

Browse files
authored
Merge pull request #218036 from bhavana-129/jira-microsoft
Product Backlog Item 2160779: SaaS App Tutorial: JIRA Microsoft Update
2 parents 19940ec + a5b9d0c commit 0971bd0

File tree

6 files changed

+34
-20
lines changed

6 files changed

+34
-20
lines changed
2.87 KB
Loading
2.78 KB
Loading
821 Bytes
Loading
3.69 KB
Loading

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 34 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/23/2022
12+
ms.date: 11/11/2022
1313
ms.author: dhivyag
1414
---
1515

@@ -30,7 +30,7 @@ Use your Microsoft Azure Active Directory account with Atlassian JIRA server to
3030
To configure Azure AD integration with JIRA SAML SSO by Microsoft, you need the following items:
3131

3232
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
33-
- JIRA Core and Software 6.4 to 9.1.0 or JIRA Service Desk 3.0 to 4.22.1 should installed and configured on Windows 64-bit version.
33+
- JIRA Core and Software 6.4 to 8.22.1 or JIRA Service Desk 3.0 to 4.22.1 should be installed and configured on Windows 64-bit version.
3434
- JIRA server is HTTPS enabled.
3535
- Note the supported versions for JIRA Plugin are mentioned in below section.
3636
- JIRA server is reachable on the Internet particularly to the Azure AD login page for authentication and should able to receive the token from Azure AD.
@@ -51,7 +51,7 @@ To get started, you need the following items:
5151
5252
## Supported versions of JIRA
5353

54-
* JIRA Core and Software: 6.4 to 9.1.0
54+
* JIRA Core and Software: 6.4 to 8.22.1.
5555
* JIRA Service Desk 3.0 to 4.22.1.
5656
* JIRA also supports 5.2. For more details, click [Microsoft Azure Active Directory single sign-on for JIRA 5.2](jira52microsoft-tutorial.md).
5757

@@ -102,50 +102,64 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
102102

103103
1. On the **Basic SAML Configuration** section, perform the following steps:
104104

105-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
106-
`https://<domain:port>/plugins/servlet/saml/auth`
107-
108-
b. In the **Identifier** box, type a URL using the following pattern:
105+
a. In the **Identifier** box, type a URL using the following pattern:
109106
`https://<domain:port>/`
110107

111-
c. In the **Reply URL** text box, type a URL using the following pattern:
108+
b. In the **Reply URL** text box, type a URL using the following pattern:
109+
`https://<domain:port>/plugins/servlet/saml/auth`
110+
111+
a. In the **Sign-on URL** text box, type a URL using the following pattern:
112112
`https://<domain:port>/plugins/servlet/saml/auth`
113113

114114
> [!NOTE]
115-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
115+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-on URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
116116

117117
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
118118

119119
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
120120

121121
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
122122

123-
> [!div class="mx-imgBorder"]
124-
> ![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
123+
![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
125124

126125
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
127126

128-
> [!div class="mx-imgBorder"]
129-
> ![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
127+
![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
130128

131129
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
132130

133-
> [!div class="mx-imgBorder"]
134-
> ![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
131+
![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
135132

136133
c. The selection can then be saved by clicking on the Save button at the top.
137134

138-
> [!div class="mx-imgBorder"]
139-
> ![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
135+
![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
140136

141137
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
142138

143-
> [!div class="mx-imgBorder"]
144-
> ![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
139+
![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
145140

146141
> [!NOTE]
147142
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
148143

144+
1. If your Azure tenant has **guest users** then follow the below configuration steps:
145+
146+
a. Click on **pencil** icon to go to the Attributes & Claims section.
147+
148+
![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
149+
150+
b. Click on **NameID** on Attributes & Claims section.
151+
152+
![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
153+
154+
c. Setup the claim conditions based on the User Type.
155+
156+
![Screenshot for claim conditions.](./media/jiramicrosoft-tutorial/claim-conditions.png)
157+
158+
>[!NOTE]
159+
> Give the NameID value as `user.userprinciplename` for Members and `user.mail` for External Guests.
160+
161+
d. **Save** the changes and verify the SSO for external guest users.
162+
149163
### Create an Azure AD test user
150164

151165
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -235,7 +249,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
235249
> To enable the default login form for admin login on login page when force azure login is enabled, add the query parameter in the browser URL.
236250
> `https://<domain:port>/login.jsp?force_azure_login=false`
237251

238-
k. **Enable Use of Application Proxy** checkbox, if you have configured your on-premise atlassian application in an App Proxy setup.
252+
k. **Enable Use of Application Proxy** checkbox, if you have configured your on-premises atlassian application in an App Proxy setup.
239253

240254
* For App proxy setup , follow the steps on the [Azure AD App Proxy Documentation](../app-proxy/what-is-application-proxy.md).
241255

24.2 KB
Loading

0 commit comments

Comments
 (0)