Configure Atlassian Guard SAML Single Sign-on and User Provisioning for Customer Accounts in Jira Service Management

Platform Notice: Cloud Only - This article only applies to Atlassian products on the cloud platform.

Summary

Atlassian Guard provides the Single Sign-on (SSO) feature, which empowers the SAML protocol, and the user provisioning feature, which uses the SCIM protocol.

An email address is one of the primary identifiers of Atlassian Cloud accounts, and mapping inconsistent values can result in creating duplicate accounts and login problems. If you are using both SAML SSO and the user provisioning (SCIM) features, make sure you map the same IDP attribute to the following SAML and SCIM attributes respectively.

Attribute name

SAML SSO

NamelD

SCIM

emails[type eq "work"].value

Diagram showing that the "emails[type eq "work"].value" mapping and NameID claim needs to be mapped to the same user attribute in the IDP

Good

Attribute name

Account attribute

SAML SSO

NamelD

user.email

SCIM

emails[type eq "work"].value

user.email

Bad

Attribute name

Account attribute

SAML SSO

NamelD

user.email

SCIM

emails[type eq "work"].value

UPN

Solution

In case you need to make changes to SAML or SCIM behavior and if the change requires updating the mappings, involve your IDP admin and make sure both SAML - NameID and SCIM - emails[type eq "work"].value point to the same user attribute in email format.

Updated on June 3, 2025

Still need help?

The Atlassian Community is here for you.