JIRA OAuth/OpenID app gives the ability to enable OAuth/OpenID Single Sign On for JIRA Software and JIRA Service Desk. JIRA Software and JIRA Service Desk are compatible with all OAuth/OpenID Providers. Here we will go through a guide to configure SSO between JIRA and Azure AD. By the end of this guide, Azure AD users should be able to login and register to JIRA Software.
To configure Azure AD integration with JIRA OAuth / OpenID Connect SSO, you need the following items:
- JIRA should be installed and configured (supported version JIRA Server 7.0.0 - 8.7.0, JIRA Data Center 7.0.0 -8.7.0 ).
- JIRA Server is https enabled.
- Admin credentials are set up in JIRA.
- Valid JIRA Server and Data center Licence.
Download And Installation
- Log into your JIRA instance as an admin.
- Navigate to the settings menu and Click Manage Apps.
- Click Find new apps or Find new add-ons from the left-hand side of the page.
- Locate JIRA OAuth / OpenID Connect Single Sign On (SSO), JIRA SSO via search.
- Click Try free to begin a new trial or Buy now to purchase a license for JIRA OAuth / OpenID Connect Single Sign On (SSO), JIRA SSO.
- Enter your information and click Generate license when redirected to MyAtlassian.
- Click Apply license.
Step 1: Setup Azure Active Directory as OAuth Provider
- Sign in to Azure portal.
- Click on App Services and go to Manage Azure Active Directory.
- In the left-hand navigation pane, click the App registrations service, and click New registration.
- When the Create page appears, enter your application's registration information:
||Name of your application.
|Application type :
- Select "Native" for client applications that are installed locally on a device. This setting is used for OAuth public native clients
- Select "Web app / API" for client applications and resource/API applications that are installed on a secure server. This setting is used for OAuth confidential web clients and public user-agent-based clients. The same application can also expose both a client and resource/API.
Sign-on URL :
- For "Web app / API" applications, provide the base URL of your app.
might be the URL for a web app running on your local machine. Users would use this URL to sign in to a web client application.
For "Native" applications, provide the URI used by Azure AD to return token responses. Enter a value specific to your application.
- When finished, click Register. Azure AD assigns a unique Application ID to your application. Copy Application ID and the Directory ID , this will be your Client ID and Tenent ID.
- Go to Certificates and Secrets from the left navigaton pane and click on New Client Secret. Enter description and expiration time and click on ADD option.
- Copy value. This will be your Secret key.
- Enter application Home page URL Logout Settings->Properties->Logout URL.