![]() ![]() ![]() Follow this procedure for other compatible Atlassian applications.ĭisable Crowd SSO functionality. The below steps are required to integrate Confluence as an SP and EAA as an IdP. In this example, plug-ins are from Kantega. There are several SAML plug-in providers for Atlassian. Extend the single sign-on (SSO) functionality through Enterprise Application Access use of third-party SAML plug-ins for the Atlassian Suite.Ītlassian applications integrated with Crowd SSO. Set up Atlassian applications as service providers (SP) and Enterprise Application Access ( EAA) as the identity provider (IdP). In the Deployment tab, click Deploy application.Ītlassian application as SP and EAA as IdP When finished, return to the application SAML settings tab to deploy the application. You may need to declare the attributes first before you map them to AD attributes.Īfter the user attributes are created, they appear as new fields in the User Attributes section of the Active Directory (AD). User attribute declarations are needed if the application requires specific attributes in addition to the default AD attributes. For SAML request, EAA supports both POST or Redirect SAML binding.įill in the remaining SAML service provider (SP) fields.Ĭonfigure user attribute declarations that are passed as SAML attributes. To download the IdP metadata, click Download.įor SAML response, EAA only supports POST SAML binding. To view or download the IdP metadata file, click View. You can upload or use the metadata information to configure the SAML service provider (SP). The IDP Info fields display filled and are not editable. Select an identity provider (IdP) and associate a directory source such as Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). The application Authentication settings tab opens. Alternatively, you can upload your own certificate.įor the remaining required fields, follow the procedure to configure access parameters for an application. Select an IdP Signing Certificate that signs the SAML request.īy default, EAA generates a self-signed certificate. The application URL is the path that users get to access the application. In Application URL, enter the URL of the application. ![]() If your app is configured under identity provider (IdP), select an application icon and category. The application General settings tab opens. Select a predefined SaaS application profile or add a custom SaaS application.Įnter an application name and an optional description. In the EAA Management Portal navigation menu, select Applications. Here is an outline of the workflow to set Enterprise Application Access as the SAML IdP for an application:Ĭonfigure EAA as the IdP for a custom SaaS application.Ĭonfigure SAML for an Access application.Ĭonfigure EAA as the IdP for a custom SaaS applicationĬonfigure Enterprise Application Access ( EAA) as the identity provider (IdP) for a SaaS application. Enterprise Application Access is able to authenticate users of the applications from their credentials in the EAA Cloud Directory or the Active Directory (AD) as it is synced with the EAA. In order for EAA applications to allow Enterprise Application Access as the IdP to authenticate, the application needs information about the user. When an IdP such as EAA and a SP such as a SaaS application both implement SAML, they are able to seamlessly authenticate accredited users associated with the IdP to use the SP. When you add a SAML or SaaS, application to EAA, the application is the service provider (SP). This means that with SAML IdP provided by Enterprise Application Access, EAA is the identity provider (IdP). When you configure Akamai as the provider type for an IdP, you grant Enterprise Application Access permission to communicate with the native application directly as the SAML IdP source. In Enterprise Application Access ( EAA), you can use a third-party SAML identity provider (IdP) or Enterprise Application Access as the SAML IdP to authenticate access to your applications. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |