Configure OKTA SAML single sign-on for portal-only customers
Platform Notice: Cloud Only - This article only applies to Atlassian apps on the cloud platform.
Summary
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, such as an identity provider and a service provider.
SAML for single sign-on (SSO) allows customers to authenticate through the organisation's Identity Provider (IDP) when logging in to the Jira Service Management Customer Portal. During an active session, customers only need to log in once to access multiple portals for one Jira Service Management instance.
Customers outside the organization can only access the organization's Jira Service Management portal. Atlassian does not count these customers toward the Atlassian Guard subscription billing. Learn more about Jira Service Management customer accounts.
Pre-requisites
To configure SSO for JSM Portal-only customers, you need:
Jira Service Management Portal
Atlassian Guard Subscription
To configure SSO for JSM Portal-only customers, you need below roles:
Organization Admin role for the Atlassian organization
User with Administrator role on OKTA
Please follow the steps below to configure the SSO with the OKTA IDP for JSM Portal-only customer users.
Set up SAML application in Okta
Log in to the OKTA Admin Portal
Go to Applications > Select Applications > Select Create App Integration > Select SAML 2.0
On the application creation page, add the application name and select Next
On the Configure SAML page, add the values and set the options as below
For all URL fields, add dummy values for now (will be updated later)
Name ID Format: EmailAddress
Application username: Email
Update application username on: Create and Update
On the next screen, select Finish and complete the setup
From the Sign On tab, select View SAML setup instructions to get the SAML values
From the SAML Setup instruction page, copy these values:
Identity Provider Single Sign-On URL
Identity Provider Issuer
X.509 Certificate
Set up SAML on the Atlassian side
Log in to https://admin.atlassian.com. The steps will differ based on your user management experience.
For Centralized user management | For Original user management |
|---|---|
1. Navigate to Apps/Products > Sites and products > and select the site 2. Under Jira Service Management, select Portal-only customers | 1. Navigate to Apps/Products > Sites and products 2. Under User Management, select Jira Service Management |
Next: Select ... (More) > Identity providers
From the IDP selection page, select OKTA
Provide any suitable directory name and select Add > Select Set up SAML single sign-on
On the next screen, paste all 3 values copied from the OKTA in the respective fields, then select Next
Identity Provider Single Sign-On URL
Identity Provider Issuer
X.509 Certificate
From the next screen, copy the Service provider entity URL and the Service provider assertion consumer service URL (to be updated on OKTA)
Update values on OKTA
On OKTA IDP, for the JSM SSO Application, go to the General tab and select Edit within the SAML Settings box.
Go to Configure SAML and update the values as below:
Single sign-on URL: <paste the "Service provider assertion consumer service URL" from the previous step>
Audience URI (SP Entity ID): <paste the "Service provider entity URL" from the previous step>
Default RelayState: Enter your JSM portal URL, for example:
https://<your_site>.atlassian.net/servicedesk/customer/portalsConfigure the attributes below under Attribute Statements:
Application Username (Name ID): Email
Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Name format: Unspecified
Value: user.firstName
Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Name format: Unspecified
Value: user.lastName
Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn
Name format: Unspecified
Value: user.getInternalProperty("id")
Save and finish the setup.
Assign users/groups to the SSO application on JSM
Add the users or groups to the assignment scope of the JSM Application on OKTA.
Test SAML Single Sign-On
On the Atlassian side, when you complete the setup, you will get an option Test single sign-on.
Select option Test single sign-on > Save settings
Select View testing steps to see the testing steps, which should match below:
Password: Enable login with email and password
Identity provider: Test single sign-on
Was this helpful?