You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/jiramicrosoft-tutorial.md
+14-21Lines changed: 14 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,61 +102,54 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
102
102
103
103
1. On the **Basic SAML Configuration** section, perform the following steps:
104
104
105
-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
106
-
`https://<domain:port>/plugins/servlet/saml/auth`
107
-
108
-
b. In the **Identifier** box, type a URL using the following pattern:
105
+
a. In the **Identifier** box, type a URL using the following pattern:
109
106
`https://<domain:port>/`
110
107
111
-
c. In the **Reply URL** text box, type a URL using the following pattern:
108
+
b. In the **Reply URL** text box, type a URL using the following pattern:
109
+
`https://<domain:port>/plugins/servlet/saml/auth`
110
+
111
+
a. In the **Sign-on URL** text box, type a URL using the following pattern:
112
112
`https://<domain:port>/plugins/servlet/saml/auth`
113
113
114
114
> [!NOTE]
115
-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
115
+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-on URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
116
116
117
117
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
118
118
119
119

120
120
121
121
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
122
122
123
-
> [!div class="mx-imgBorder"]
124
-
> 
123
+

125
124
126
125
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
127
126
128
-
> [!div class="mx-imgBorder"]
129
-
> 
127
+

130
128
131
129
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
132
130
133
-
> [!div class="mx-imgBorder"]
134
-
> 
131
+

135
132
136
133
c. The selection can then be saved by clicking on the Save button at the top.
137
134
138
-
> [!div class="mx-imgBorder"]
139
-
> 
135
+

140
136
141
137
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
142
138
143
-
> [!div class="mx-imgBorder"]
144
-
> 
139
+

145
140
146
141
> [!NOTE]
147
142
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
148
143
149
144
1. If your Azure tenant has **guest users** then follow the below configuration steps:
150
145
151
-
a. Click on **Edit/pencil** icon to go to the Attributes & Claims section.
146
+
a. Click on **pencil** icon to go to the Attributes & Claims section.
152
147
153
-
> [!div class="mx-imgBorder"]
154
-
> 
148
+

155
149
156
150
b. Click on **NameID** on Attributes & Claims section.
157
151
158
-
> [!div class="mx-imgBorder"]
159
-
> 
152
+

160
153
161
154
c. Setup the claim conditions based on the User Type.
0 commit comments