Skip to content

Commit 7e619e6

Browse files
authored
Merge pull request #224672 from bhavana-129/atlasian-cloud-updtes
Product Backlog Item 2323533: SaaS App Tutorial: Atlassian Cloud Update
2 parents ba48ad7 + 1adfea2 commit 7e619e6

File tree

9 files changed

+26
-43
lines changed

9 files changed

+26
-43
lines changed

articles/active-directory/saas-apps/atlassian-cloud-tutorial.md

Lines changed: 26 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/06/2023
12+
ms.date: 01/23/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory SSO integration with Atlassian Cloud
@@ -49,7 +49,7 @@ To configure the integration of Atlassian Cloud into Azure AD, you need to add A
4949
1. In the **Add from the gallery** section, type **Atlassian Cloud** in the search box.
5050
1. Select **Atlassian Cloud** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5151

52-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about O365 wizards [here](/microsoft-365/admin/misc/azure-ad-setup-guides?view=o365-worldwide&preserve-view=true).
52+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about Microsoft 365 wizards [here](/microsoft-365/admin/misc/azure-ad-setup-guides?view=o365-worldwide&preserve-view=true).
5353

5454
## Configure and test Azure AD SSO
5555

@@ -58,8 +58,8 @@ Configure and test Azure AD SSO with Atlassian Cloud using a test user called **
5858
To configure and test Azure AD SSO with Atlassian Cloud, perform the following steps:
5959

6060
1. **[Configure Azure AD with Atlassian Cloud SSO](#configure-azure-ad-with-atlassian-cloud-sso)** - to enable your users to use Azure AD based SAML SSO with Atlassian Cloud.
61-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
62-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
62+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
6363
1. **[Create Atlassian Cloud test user](#create-atlassian-cloud-test-user)** - to have a counterpart of B.Simon in Atlassian Cloud that is linked to the Azure AD representation of user.
6464
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6565

@@ -75,23 +75,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7575

7676
![Setup configuration](common/setup-sso.png)
7777

78-
1. If you want to setup Atlassian Cloud manually, log in to your Atlassian Cloud company site as an administrator and perform the following steps.
78+
1. If you want to set up Atlassian Cloud manually, log in to your Atlassian Cloud company site as an administrator and perform the following steps.
7979

80-
1. Before you start go to your Atlassian product instance and copy/save the Instance URL.
81-
> [!NOTE]
82-
> URL should fit `https://<INSTANCE>.atlassian.net` pattern.
80+
1. In the **ATLASSIAN Admin** portal, navigate to **Security** > **Identity providers** > **Microsoft Azure AD**.
8381

84-
![Instance Name](./media/atlassian-cloud-tutorial/instance.png)
82+
![Screenshot shows the Instance Profile Name.](./media/atlassian-cloud-tutorial/name.png "Profile")
8583

86-
1. Open the [Atlassian Admin Portal](https://admin.atlassian.com/) and click on your organization name.
84+
1. Enter the **Directory name** and click **Add** button.
8785

88-
![Admin Portal](./media/atlassian-cloud-tutorial/organization.png)
86+
![Screenshot shows the Directory for Admin Portal.](./media/atlassian-cloud-tutorial/directory.png "Add Directory")
8987

90-
1. You need to verify your domain before going to configure single sign-on. For more information, see [Atlassian domain verification](https://confluence.atlassian.com/cloud/domain-verification-873871234.html) document.
88+
1. Select **Set up SAML single sign-on** button to connect your identity provider to Atlassian organization.
9189

92-
1. In the **ATLASSIAN Admin** portal, navigate to **Security** tab, select **SAML single sign-on** and click **Add SAML configuration**.
93-
94-
![Security](./media/atlassian-cloud-tutorial/admin.png)
90+
![Screenshot shows the Security of identity provider.](./media/atlassian-cloud-tutorial/provider.png "Security")
9591

9692
1. In the Azure portal, on the **Atlassian Cloud** application integration page, find the **Manage** section and select **Set up single sign-on**.
9793

@@ -107,35 +103,33 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
107103

108104
![Single Sign-On](./media/atlassian-cloud-tutorial/configure.png)
109105

110-
b. Copy **Login URL** value from Azure portal, paste it in the **Identity Provider SSO URL** textbox in Atlassian.
106+
b. Copy **Login URL** value from Azure portal, paste it in the **Identity provider SSO URL** textbox in Atlassian.
111107

112-
c. Copy **Azure AD Identifier** value from Azure portal, paste it in the **Identity Provider Entity ID** textbox in Atlassian.
108+
c. Copy **Azure AD Identifier** value from Azure portal, paste it in the **Identity provider Entity ID** textbox in Atlassian.
113109

114110
![Identity Provider SSO URL](./media/atlassian-cloud-tutorial/configuration-azure.png)
115111

116-
![Entity id](./media/atlassian-cloud-tutorial/login.png)
112+
![Screenshot shows the Configuration values.](./media/atlassian-cloud-tutorial/metadata.png "Azure values")
117113

118114
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
119115

120116
![signing Certificate](./media/atlassian-cloud-tutorial/certificate.png)
121117

122-
![Certificate 1](./media/atlassian-cloud-tutorial/certificate-download.png)
118+
![Screenshot shows the Certificate in Azure.](./media/atlassian-cloud-tutorial/entity.png "Add Details")
123119

124-
1. **Add** and **Save** the SAML Configuration in Atlassian.
120+
1. Save the SAML Configuration and click **Next** in Atlassian.
125121

126122
1. On the **Basic SAML Configuration** section, perform the following steps.
127123

128-
a. Copy **SP Entity ID** value from Atlassian, paste it in the **Identifier (Entity ID)** box in Azure and set it as default.
129-
130-
b. Copy **SP Assertion Consumer Service URL** value from Atlassian, paste it in the **Reply URL (Assertion Consumer Service URL)** box in Azure and set it as default.
124+
a. Copy **Service provider entity URL** value from Atlassian, paste it in the **Identifier (Entity ID)** box in Azure and set it as default.
131125

132-
c. Copy your **Instance URL** value, which you copied at step 4 and paste it in the **Relay State** box in Azure.
133-
134-
![Copy URLs](./media/atlassian-cloud-tutorial/values.png)
126+
b. Copy **Service provider assertion consumer service URL** value from Atlassian, paste it in the **Reply URL (Assertion Consumer Service URL)** box in Azure and set it as default.
135127

136-
![Button](./media/atlassian-cloud-tutorial/edit-button.png)
128+
c. Click **Next**.
129+
130+
![Screenshot shows the Service provider images.](./media/atlassian-cloud-tutorial/steps.png "Page")
137131

138-
![URLs image](./media/atlassian-cloud-tutorial/image.png)
132+
![Screenshot shows the Service provider Values.](./media/atlassian-cloud-tutorial/provide.png "Provider Values")
139133

140134
1. Your Atlassian Cloud application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. You can edit the attribute mapping by clicking on **Edit** icon.
141135

@@ -169,20 +163,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
169163

170164
![image 4](./media/atlassian-cloud-tutorial/final-attributes.png)
171165

172-
1. To enforce SAML single sign-on in an authentication policy, perform the following steps.
173-
174-
a. From the **Atlassian Admin** Portal, select **Security** tab and click **Authentication policies**.
175-
176-
b. Select **Edit** for the policy you want to enforce.
177-
178-
c. In **Settings**, enable the **Enforce single sign-on** to their managed users for the successful SAML redirection.
179-
180-
d. Click **Update**.
181-
182-
![Authentication policies](./media/atlassian-cloud-tutorial/policy.png)
183-
184-
> [!NOTE]
185-
> The admins can test the SAML configuration by only enabling enforced SSO for a subset of users first on a separate authentication policy, and then enabling the policy for all users if there are no issues.
166+
1. Click **Stop and save SAML** button.
167+
168+
![Screenshot shows the image of saving configuration.](./media/atlassian-cloud-tutorial/continue.png "Save configuration")
186169

187170
### Create an Azure AD test user
188171

@@ -238,4 +221,4 @@ You can also use Microsoft My Apps to test the application in any mode. When you
238221

239222
## Next steps
240223

241-
Once you configure Atlassian Cloud you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
224+
Once you configure Atlassian Cloud you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
19.9 KB
Loading
49.9 KB
Loading
37.6 KB
Loading
32.6 KB
Loading
73.1 KB
Loading
23.3 KB
Loading
63 KB
Loading
27.7 KB
Loading

0 commit comments

Comments
 (0)