What's New !!

Pricing Offers

We are happy to announce special offers for miniOrange Atlassian SSO, 2FA, REST API, User Sync and Group Sync Apps.

Contact Info

For any query, product related information or any help , contact us now. You can also raise a ticket with our support.

 

Contact Us Now

SSO Connector for Jira and Crowd


The miniOrange Crowd SSO connector expands the SAML SSO functionality from Crowd to its connected Atlassian applications.The Jira Crowd SSO Connector allows users to enable SAML Authentication from any SAML compliant Identity Provider(IDP), where SAML SSO requests and responses to and from IDP will pass via the Crowd server. The IDP will perform user authentication while user permissions can still be controlled using Crowd.

You can refer the steps to configure Crowd connector from the video or documentation given below

Download And Installation



  • Log into your Jira instance as an admin.
  • Navigate to the settings menu and Click Manage Apps.
  • Click Find new apps or Find new add-ons from the left-hand side of the page.
  • Locate SSO connector for Crowd and Jira via search.
  • Click Try free to begin a new trial or Buy now to purchase a license of SSO connector for Crowd and Jira.
  • Enter your information and click Generate license when redirected to MyAtlassian.
  • Click Apply license.
  • SAML Single Sign On (SSO) Connector for Crowd and Jira, Install Jira Add-On through manage apps menu

Plugin Configuration



  • To configure the plugin, firstly configure Crowd SAML Single Sign-On (SSO) plugin for your Identity Provider as mentioned in the steps.
  • Now, Enable Crowd SSO for your Jira instance.
  • You can find the steps to integrate your Crowd server with your Jira instance here.

    Configure Jira to use Crowd's Authenticator to enable SSO


    1. If Jira is running, shut it down first.
    2. Edit the JIRA/atlassian-jira/WEB-INF/classes/seraph-config.xml file. Comment out the authenticator node:

      1. If Jira is running, shut it down first.
      2. Edit the JIRA/atlassian-jira/WEB-INF/classes/seraph-config.xml file. Comment out the authenticator node:

        <!--<authenticator class="com.atlassian.jira.security.login.JiraSeraphAuthenticator"/>-->
                                      


        Uncomment the line that contains the new authenticator:

        <authenticator class="com.atlassian.jira.security.login.SSOSeraphAuthenticator"/>
                                          
      3. Copy the crowd.properties file from CROWD/client/conf/ to JIRA/atlassian-jira/WEB-INF/classes.
      4. Edit JIRA/atlassian-jira/WEB-INF/classes/crowd.properties. Change the following properties:

        Key

        Value

        application.name

        jira
        The application name must match the name that you specified when you defined the application in Crowd.

        application.password

        The password must match the one that you specified when you defined the application in Crowd.

        crowd.base.url

        eg. (http://localhost:8095/crowd/)
        If your Crowd server's port is configured differently from the default (i.e. 8095), set it accordingly.

        crowd.base.url must be the same URL used to access Crowd in your Browser.

        session.validationinterval

        Set to 0, if you want authentication checks to occur on each request. Otherwise set to the number of minutes between request to validate if the user is logged in or out of the Crowd SSO server. Setting this value to 1 or higher will increase the performance of Crowd's integration.

  • Go to SSO Configuration tab of Jira-Crowd Connector plugin.
  • Enter Crowd Base URL and click on Save.
  • SAML Single Sign On (SSO) Connector for Crowd and Jira, Crowd Base URL
  • Now, all the IdPs are listed that you have configured with SAML SSO Crowd plugin.
  • The Enable SSO button is provided for every individual IdP. You can enable SSO for specific IdPs with the help of the buttons.
  • SAML Single Sign On (SSO) Connector for Crowd and Jira, Identity Providers

SSO Redirection



  • If you have only one IDP configured, then you can use the features provided on the SSO Redirection tab and Redirection Rules tab of the plugin to manage the redirection on the login page.
  • Enable the Auto Redirect to IDP option on the SSO Redirection tab if you want to allow users to log in only using IDP.
  • Use the Emergency/Backdoor Login URL to allow all admins to access the Jira default login page and log in using Crowd credentials.
  • Use the settings given on Redirection Rules tab to redirect the users on login page based on their email domains, groups and directories. This feature is more useful in case you have multiple IDPs configured. Please refer to the next section.
  • SAML Single Sign On (SSO) Connector for Crowd and Jira, SSO Redirection

Managing SSO with multiple IDPs



  • If you have multiple IDPs configured, you can choose how you want your end users to use these IDPs to perform SSO.
  • For example you can show the buttons for the different IDPs configured on the login page nad let the users decide which IDP to use for SSO.
  • Or you could force certain users to use a specific IDP based on the domain of their username/email.
  • You will be able to configure these rules in the Redirection Rules section, under the Redirection Rules tab.
  • By default one rule is always configured that will be applicable to all the users, irrespective of their user domains.
  • For instance, if you want to display the login page with SSO buttons for each of the IDPs then your Default Rule will be as follows :
  • SAML Single Sign On (SSO) into Jira, default redirection rule
  • Based on the default rule mentioned above, the login form will contain buttons for each IDP. The users will be free to choose whichever IDP they want to use to initiate SSO.
  • SAML Single Sign On (SSO) into Jira, default redirection rule login page
  • You can also configure a rule so that your users will automatically be redirected to an IDP based on their email domains.
  • For example, if you want users with example.com as domain to be redirected to IDP 1 you can add a rule by :

    1. Click on the Add Rule button in the Redirection Rules tab.
    2. Enter a name for your rule in Rule Name.
    3. In the IF statement select Email Domain in the first drop-down.
    4. For the same statement select equals in the second drop-down.
    5. In the last field of the IF statement, enter the email domain(example.com for the purpose of this example).
    6. In the Then Redirect To drop-down, select the IDP you want the users with example.com to be redirected to(IDP 1 in this case).
    7. Click on Save.
    8. SAML Single Sign On (SSO) into Jira, example rule
  • When a rule such as an example given above is configured, a login form will be displayed to the users where they will have to input their email address.
  • SAML Single Sign On (SSO) into Jira, Domain mapping form

Customize your login page



  • Go to the Look and Feel tab of the plugin.
  • Here, you can design your own login template that will be used to initiate SSO. This will display your customized login page instead of application's default login page.
  • SAML Single Sign On (SSO) into Jira, custom login template

Crowd Troubleshooting

If you encounter any difficulties while setting up miniOrange Crowd add-ons, please refer to this Crowd troubleshooting page for assistance.

Recommended Add-Ons




Free Trial

If you don't find what you are looking for, please contact us at support-atlassian@miniorange.atlassian.net or raise a support ticket here.