apps/docs/content/guides/integrate/services/atlassian-saml.mdx
This guide shows how to enable login with ZITADEL on Atlassian.
It covers how to:
Prerequisites:
We have to switch between ZITADEL and Atlassian. If the headings begin with "ZITADEL" switch to the ZITADEL Management Console and if the headings start with "Atlassian" please switch to the Atlassian Admin GUI.
Please follow the instructions on Atlassian's support page to configure a SAML identity provider for SSO. The following instructions give you a quick overview of the most important steps.
Login to Atlassian's security center and select Identity providers. Select the option to Set up SAML single sign-on.
For Identity Provider select "Other provider" and enter a Directory Name.
Follow the wizard. Fill in the following information:
Identity provider Entity ID: {your_instance_domain}/saml/v2/metadataIdentity provider SSO URL: {your_instance_domain}/saml/v2/SSOPublic x509 certificate: You need to download and paste the value of the certificate from {your_instance_domain}/saml/v2/certificateCreate a new .xml file with the following minimal SAML metadata contents:
<?xml version="1.0"?>
<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="${ENTITYID}">
<md:SPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol urn:oasis:names:tc:SAML:1.1:protocol">
<md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="${ACSURL}" index="0"/>
</md:SPSSODescriptor>
</md:EntityDescriptor>
Set or replace the variables with the values from the next screen as follows:
${ENTITYID}: Copy the value from "Service provider entity URL"${ACSURL}: Copy the value from "Service provider assertion consumer service URL"In your existing project:
Press the "+"-button to add an application
Fill in a name for the application and chose the SAML type, then click "Continue".
Either fill in the URL where ZITADEL can read the metadata from, or upload the metadata XML directly, then click "Continue".
Check your application, if everything is correct, press "Create".
Under Authentication policies, select "Edit" on the directory that you have created. Then check the box "Enforce single sign-on" and confirm by clicking "Update".
Add members to your policy.
Now you should be all set to verify your setup: