Suggested Claim Mapping between Azure AD and Jira

Platform Notice: Data Center Only - This article only applies to Atlassian apps on the Data Center platform.

Note that this KB was created for the Data Center version of the product. Data Center KBs for non-Data-Center-specific features may also work for Server versions of the product, however they have not been tested. Support for Server* products ended on February 15th 2024. If you are running a Server product, you can visit the Atlassian Server end of support announcement to review your migration options.

*Except Fisheye and Crucible

Summary

These are only a recommendation based on what we most commonly see and you should work with your Azure Administrator to ensure that everything is aligned with your Organizational Policies and Requirements.

Integrating Jira with Azure AD for Single-Sign-On is usually a straight-forward process, however, the claim mapping between systems can sometimes be tricky. The content below should help you setup a SAML integration with the correct claims being released from Azure AD and mapped in Jira.

You should follow these suggestions if you use the SSO for Atlassian DC app and:

  • You are setting up Single-Sign-On in Jira for the first time using Azure AD as your IDP

  • You already have Single-Sign-On setup with Azure AD and you see login errors when trying to access Jira

  • You would like to enable JIT User Provisioning in Jira and need to reference the right claims to release and map in Jira.

Solution

Environment

9.0.0 → 9.15.0+

Claims in Azure AD

In Azure AD, we recommend releasing the following claims:

Claim in Azure AD

Common URL

Name ID

http://schemas.microsoft.com/ws/2005/05/identity/claims/name

Given Name

http://schemas.microsoft.com/ws/2005/05/identity/claims/givenname

Surname

http://schemas.microsoft.com/ws/2005/05/identity/claims/surname

Email

http://schemas.microsoft.com/ws/2005/05/identity/claims/email

Groups

http://schemas.microsoft.com/ws/2008/06/identity/claims/groups

ℹ️ In Azure, it generally looks like this:

(Auto-migrated image: description temporarily unavailable)

Mapping the Claims in Jira

In Jira, you will navigate to Settings > System > Authentication Methods then select to create a new SAML integration, or edit your existing SAML integration with Azure AD

Then, under the field: Username Mapping, you will want to ensure that it's mapped to Name ID. In most cases, it should look like this:

(Auto-migrated image: description temporarily unavailable)

ℹ️ If you plan to enable JIT provisioning, then click on the checkbox "Create users on login to the application" and add the claims above to the rest of the values listed

(Auto-migrated image: description temporarily unavailable)
  • Display name should be a combination of givenname and surname:

    ${http://schemas.microsoft.com/ws/2005/05/identity/claims/givenname} ${http://schemas.microsoft.com/ws/2005/05/identity/claims/surname}
  • Email should be mapped to the email claim:

    ${http://schemas.microsoft.com/ws/2005/05/identity/claims/email}
  • And groups should be mapped to groups, and you should not use the attribute mapping parameters

    http://schemas.microsoft.com/ws/2008/06/identity/claims/groups

Testing:

At this point, you are ready to test the authentication flow as both an existing, and new, user. Its recommended that you use a SAML tracer app and enable additional logging in Jira (see: Troubleshooting SAML authentication failures with additional debug logging) to help debug any additional login issue, or adjust the claims based on the data contained within the SAML assertion.

Updated on April 8, 2025

Still need help?

The Atlassian Community is here for you.