You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -145,11 +145,48 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
145
145
146
146
## Configure EasySSO for BitBucket SSO
147
147
148
-
To configure single sign-on on **EasySSO for BitBucket** side, you need to send the **App Federation Metadata Url** to [EasySSO for BitBucket support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
148
+
1. Sign into your EasySSO for BitBucket instance with Administrator privileges and navigate to the **Manage Apps** section.
1. Select **Certificates** tab on the top and you will be presented with the following screen and locate **Certificate (Base64)** or **Metadata File** you have saved in the earlier steps of **Azure AD SSO** configuration. You have following options on how to proceed:
a. Use the App Federation **Metadata File** you downloaded to local file on your computer. Select **Upload** radio button and follow the upload file dialog specific to your operating system
165
+
166
+
**OR**
167
+
168
+
b. Open the App Federation **Metadata File** to see the content (in any plain text editor) of the file and copy it into the clipboard. Select **Input** option and paste clipboard content into the text field.
169
+
170
+
**OR**
171
+
172
+
c. Fully manual configuration. Open the App Federation **Certificate (Base64)** to see the content (in any plain text editor) of the file and copy it into the clipboard. Paste it into **IdP Token Signing Certificates** text field. Then navigate to **General** tab and fill **POST Binding URL** and **Entity ID** fields with respective values for **Login URL** and **Azure AD Identifier** you saved previously.
173
+
174
+
1. Click **Save** button on the bottom of the page. You will see the content of the Metadata or Certificate files is parsed into the configuration fields. EasySSO for BitBucket configuration is complete.
175
+
176
+
1. For the best testing experience, navigate to **Look & Feel** tab and check the **SAML Login Button** option on. This will enable separate button on the Jira login screen specifically to test your Azure AD SAML integration end to end. You can leave this button on and configure its placement, colour and translation for production mode, too.
> Should you have any issues, please contact [EasySSO support team](mailto:[email protected]).
149
182
150
183
### Create EasySSO for BitBucket test user
151
184
152
-
In this section, a user called Britta Simon is created in EasySSO for BitBucket. EasySSO for BitBucket supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in EasySSO for BitBucket, a new one is created after authentication.
185
+
In this section, a user called B.Simon is created in EasySSO for BitBucket. EasySSO for BitBucket supports just-in-time user provisioning, which is **disabled** by default. To enable user provisioning, you have to explicitly check **Create user on successful login** option on in the General section of EasySSO plugin configuration. If a user doesn't already exist in EasySSO for BitBucket, a new one is created after authentication.
186
+
187
+
However, if you do not wish to enable automatic user provisioning on the user first login, users must exist in backend User Directories the EasySSO for BitBucket instance make use of, such as LDAP or Atlassian Crowd.
0 commit comments