Skip to content

Commit 937f053

Browse files
committed
update
1 parent 2f22c62 commit 937f053

File tree

5 files changed

+14
-21
lines changed

5 files changed

+14
-21
lines changed
2.87 KB
Loading
2.78 KB
Loading
821 Bytes
Loading
3.69 KB
Loading

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 14 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -102,61 +102,54 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
102102

103103
1. On the **Basic SAML Configuration** section, perform the following steps:
104104

105-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
106-
`https://<domain:port>/plugins/servlet/saml/auth`
107-
108-
b. In the **Identifier** box, type a URL using the following pattern:
105+
a. In the **Identifier** box, type a URL using the following pattern:
109106
`https://<domain:port>/`
110107

111-
c. In the **Reply URL** text box, type a URL using the following pattern:
108+
b. In the **Reply URL** text box, type a URL using the following pattern:
109+
`https://<domain:port>/plugins/servlet/saml/auth`
110+
111+
a. In the **Sign-on URL** text box, type a URL using the following pattern:
112112
`https://<domain:port>/plugins/servlet/saml/auth`
113113

114114
> [!NOTE]
115-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
115+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-on URL. Port is optional in case it’s a named URL. These values are received during the configuration of Jira plugin, which is explained later in the tutorial.
116116

117117
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
118118

119119
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
120120

121121
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
122122

123-
> [!div class="mx-imgBorder"]
124-
> ![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
123+
![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
125124

126125
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
127126

128-
> [!div class="mx-imgBorder"]
129-
> ![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
127+
![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
130128

131129
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
132130

133-
> [!div class="mx-imgBorder"]
134-
> ![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
131+
![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
135132

136133
c. The selection can then be saved by clicking on the Save button at the top.
137134

138-
> [!div class="mx-imgBorder"]
139-
> ![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
135+
![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
140136

141137
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
142138

143-
> [!div class="mx-imgBorder"]
144-
> ![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
139+
![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
145140

146141
> [!NOTE]
147142
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
148143

149144
1. If your Azure tenant has **guest users** then follow the below configuration steps:
150145

151-
a. Click on **Edit/pencil** icon to go to the Attributes & Claims section.
146+
a. Click on **pencil** icon to go to the Attributes & Claims section.
152147

153-
> [!div class="mx-imgBorder"]
154-
> ![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
148+
![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
155149

156150
b. Click on **NameID** on Attributes & Claims section.
157151

158-
> [!div class="mx-imgBorder"]
159-
> ![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
152+
![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
160153

161154
c. Setup the claim conditions based on the User Type.
162155

0 commit comments

Comments
 (0)