You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/confluencemicrosoft-tutorial.md
+22-15Lines changed: 22 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 04/22/2019
17
+
ms.date: 05/28/2019
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -74,6 +74,7 @@ As of now, following versions of Confluence are supported:
74
74
- Confluence: 6.10.0
75
75
- Confluence: 6.11.0
76
76
- Confluence: 6.12.0
77
+
- Confluence: 6.15.3
77
78
78
79
> [!NOTE]
79
80
> Please note that our Confluence Plugin also works on Ubuntu Version 16.04
@@ -176,34 +177,40 @@ To configure Azure AD single sign-on with Confluence SAML SSO by Microsoft, perf
176
177
177
178
5. Perform following steps on configuration page:
178
179
179
-

180
+

180
181
181
182
> [!TIP]
182
183
> Ensure that there is only one certificate mapped against the app so that there is no error in resolving the metadata. If there are multiple certificates, admin gets an error upon resolving the metadata.
183
184
184
-
a. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
185
+
1. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
185
186
186
-
b. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **Basic SAML Configuration** section on Azure portal.
187
+
1. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **Basic SAML Configuration** section on Azure portal.
187
188
188
-
c. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
189
+
1. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
189
190
190
-
d. In **SAML User ID Locations**, select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the Confluence user ID. If the user ID is not matched, then system will not allow users to sign in.
191
+
1. In **SAML User ID Locations**, select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the Confluence user ID. If the user ID is not matched, then system will not allow users to sign in.
191
192
192
-
> [!Note]
193
-
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
193
+
> [!Note]
194
+
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
194
195
195
-
e. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
196
+
1. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
196
197
197
-
f. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
198
+
1. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
198
199
199
-
g. In **Domain Name** type the domain name here in case of the ADFS-based login.
200
+
1. In **Domain Name** type the domain name here in case of the ADFS-based login.
200
201
201
-
h. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user signs out from Confluence.
202
+
1. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user signs out from Confluence.
202
203
203
-
i. Click **Save** button to save the settings.
204
+
1. Enable **Force Azure Login** checkbox, if you wish to sign in through Azure AD credentials only.
205
+
206
+
> [!Note]
207
+
> To enable the default login form for admin login on the login page when the force azure login is enabled, add the query parameter in the browser URL.
> For more information about installation and troubleshooting, visit [MS Confluence SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md) and there is also [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance
212
+
> [!NOTE]
213
+
> For more information about installation and troubleshooting, visit [MS Confluence SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md). There is also an [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/jiramicrosoft-tutorial.md
+23-17Lines changed: 23 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 04/22/2019
17
+
ms.date: 05/28/2019
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -40,7 +40,7 @@ Use your Microsoft Azure Active Directory account with Atlassian JIRA server to
40
40
To configure Azure AD integration with JIRA SAML SSO by Microsoft, you need the following items:
41
41
42
42
- An Azure AD subscription
43
-
- JIRA Core and Software 6.0 to 7.12 or JIRA Service Desk 3.0 to 3.5 should installed and configured on Windows 64-bit version
43
+
- JIRA Core and Software 6.4 to 8.0 or JIRA Service Desk 3.0 to 3.5 should installed and configured on Windows 64-bit version
44
44
- JIRA server is HTTPS enabled
45
45
- Note the supported versions for JIRA Plugin are mentioned in below section.
46
46
- JIRA server is reachable on internet particularly to Azure AD Login page for authentication and should able to receive the token from Azure AD
@@ -58,7 +58,7 @@ To test the steps in this tutorial, you should follow these recommendations:
58
58
59
59
## Supported versions of JIRA
60
60
61
-
* JIRA Core and Software: 6.0 to 7.12
61
+
* JIRA Core and Software: 6.4 to 8.0
62
62
* JIRA Service Desk 3.0.0 to 3.5.0
63
63
* JIRA also supports 5.2. For more details, click [Microsoft Azure Active Directory single sign-on for JIRA 5.2](jira52microsoft-tutorial.md)
64
64
@@ -178,34 +178,40 @@ To configure Azure AD single sign-on with JIRA SAML SSO by Microsoft, perform th
178
178
179
179
6. Perform following steps on configuration page:
180
180
181
-

181
+

182
182
183
183
> [!TIP]
184
184
> Ensure that there is only one certificate mapped against the app so that there is no error in resolving the metadata. If there are multiple certificates, upon resolving the metadata, admin gets an error.
185
185
186
-
a. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
186
+
1. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
187
187
188
-
b. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **JIRA SAML SSO by Microsoft Domain and URLs** section on Azure portal.
188
+
1. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **JIRA SAML SSO by Microsoft Domain and URLs** section on Azure portal.
189
189
190
-
c. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
190
+
1. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
191
191
192
-
d. In **SAML User ID Locations** select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the JIRA user ID. If the user ID is not matched, then system will not allow users to sign in.
192
+
1. In **SAML User ID Locations** select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the JIRA user ID. If the user ID is not matched, then system will not allow users to sign in.
193
193
194
-
> [!Note]
195
-
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
194
+
> [!Note]
195
+
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
196
196
197
-
e. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
197
+
1. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
198
198
199
-
f. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
199
+
1. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
200
200
201
-
g. In **Domain Name** type the domain name here in case of the ADFS-based login.
201
+
1. In **Domain Name** type the domain name here in case of the ADFS-based login.
202
202
203
-
h. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user sign out from JIRA.
203
+
1. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user sign out from JIRA.
204
+
205
+
1. Enable **Force Azure Login** checkbox, if you wish to sign in through Azure AD credentials only.
206
+
207
+
> [!Note]
208
+
> To enable the default login form for admin login on login page when force azure login is enabled, add the query parameter in the browser URL.
> For more information about installation and troubleshooting, visit [MS JIRA SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md) and there is also [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance
213
+
> [!NOTE]
214
+
> For more information about installation and troubleshooting, visit [MS JIRA SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md). There is also an [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance.
0 commit comments