Skip to content

Commit ecfcc7f

Browse files
committed
update
1 parent 7083f6c commit ecfcc7f

File tree

1 file changed

+40
-3
lines changed

1 file changed

+40
-3
lines changed

articles/active-directory/saas-apps/easysso-for-bitbucket-tutorial.md

Lines changed: 40 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 05/13/2020
16+
ms.date: 05/18/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -145,11 +145,48 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
145145

146146
## Configure EasySSO for BitBucket SSO
147147

148-
To configure single sign-on on **EasySSO for BitBucket** side, you need to send the **App Federation Metadata Url** to [EasySSO for BitBucket support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
148+
1. Sign into your EasySSO for BitBucket instance with Administrator privileges and navigate to the **Manage Apps** section.
149+
150+
![Manage Apps](./media/easysso-for-bitbucket-tutorial/jira-admin-1.png)
151+
152+
1. Click on **EasySSO**.
153+
154+
![Easy SSO](./media/easysso-for-bitbucket-tutorial/jira-admin-2.png)
155+
156+
1. Select **SAML** option. This will take you to SAML configuration section.
157+
158+
![SAML](./media/easysso-for-bitbucket-tutorial/jira-admin-3.png)
159+
160+
1. Select **Certificates** tab on the top and you will be presented with the following screen and locate **Certificate (Base64)** or **Metadata File** you have saved in the earlier steps of **Azure AD SSO** configuration. You have following options on how to proceed:
161+
162+
![Metadata URL](./media/easysso-for-bitbucket-tutorial/jira-admin-4.png)
163+
164+
a. Use the App Federation **Metadata File** you downloaded to local file on your computer. Select **Upload** radio button and follow the upload file dialog specific to your operating system
165+
166+
**OR**
167+
168+
b. Open the App Federation **Metadata File** to see the content (in any plain text editor) of the file and copy it into the clipboard. Select **Input** option and paste clipboard content into the text field.
169+
170+
**OR**
171+
172+
c. Fully manual configuration. Open the App Federation **Certificate (Base64)** to see the content (in any plain text editor) of the file and copy it into the clipboard. Paste it into **IdP Token Signing Certificates** text field. Then navigate to **General** tab and fill **POST Binding URL** and **Entity ID** fields with respective values for **Login URL** and **Azure AD Identifier** you saved previously.
173+
174+
1. Click **Save** button on the bottom of the page. You will see the content of the Metadata or Certificate files is parsed into the configuration fields. EasySSO for BitBucket configuration is complete.
175+
176+
1. For the best testing experience, navigate to **Look & Feel** tab and check the **SAML Login Button** option on. This will enable separate button on the Jira login screen specifically to test your Azure AD SAML integration end to end. You can leave this button on and configure its placement, colour and translation for production mode, too.
177+
178+
![Look & Feel](./media/easysso-for-bitbucket-tutorial/jira-admin-5.png)
179+
180+
> [!NOTE]
181+
> Should you have any issues, please contact [EasySSO support team](mailto:[email protected]).
149182
150183
### Create EasySSO for BitBucket test user
151184

152-
In this section, a user called Britta Simon is created in EasySSO for BitBucket. EasySSO for BitBucket supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in EasySSO for BitBucket, a new one is created after authentication.
185+
In this section, a user called B.Simon is created in EasySSO for BitBucket. EasySSO for BitBucket supports just-in-time user provisioning, which is **disabled** by default. To enable user provisioning, you have to explicitly check **Create user on successful login** option on in the General section of EasySSO plugin configuration. If a user doesn't already exist in EasySSO for BitBucket, a new one is created after authentication.
186+
187+
However, if you do not wish to enable automatic user provisioning on the user first login, users must exist in backend User Directories the EasySSO for BitBucket instance make use of, such as LDAP or Atlassian Crowd.
188+
189+
![User provisioning](./media/easysso-for-bitbucket-tutorial/jira-admin-6.png)
153190

154191
## Test SSO
155192

0 commit comments

Comments
 (0)