Skip to main content

Atlassian Cloud

Introduction#

Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only you know or have access to. Security Assertion Markup Language (SAML) is a protocol for authenticating to web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.

Acceptto™, as a SAML provider, improves the user login experience for Atlassian users with convenient MFA, and offers a simple SAML solution for adding MFA and single sign-on (SSO) on the Atlassian portal.

Pre-Requisites#

  1. An Acceptto account with a configured Identity Provider and LDAP Agent. (See this page for the instructions)
  2. An Atlassian Cloud user account with administrative access.
  3. A user with administrative privileges for the Acceptto Cloud dashboard.

Configure Atlassian Cloud as a Service Provider#

  1. Download the SAML metadata and certificate for your organization from Acceptto.

    Metadata Download at https://sso.acceptto.com/<myorganization>/saml/download/metadata or view at https://sso.acceptto.com/<myorganization>/saml/metadata

    Certificate Download at https://sso.acceptto.com/<myorganization>/saml/download/cert

  2. Login to your Atlassian admin portal as an administrator.

  3. Navigate to the Security tab and click on SAML single sign-on.

Atlassian as a SP configuration

  1. Click Add SAML configuration and enter the following information from Acceptto IdP:

    • Identity provider Entity ID - The entityID found in the metadata (e.g. https://sso.acceptto.com/<myorganization>/saml)

    • Identity provider SSO URL - The SingleSignOnService found in the metadata (e.g. https://sso.acceptto.com/<myorganization>/saml/auth)

    • Public x509 certificate - Copy the certificate downloaded from Acceptto in the first step.

  2. Click Save.

Acceptto SAML Configuration as Identity Provider (IdP)#

  1. Login to the Acceptto Dashboard with an administrative account and go to Applications.
  2. Create a new application by selecting Create New Application.

Acceptto create application

  1. In the New Application form, enter the following values under the General tab.
    • Name - The application name displayed in the admin panel and application portal and used for push notifications and audit logs. (e.g. Atlassian Cloud)
    • Type - Select "SAML Service Provider" from the options.
    • Out of Band Methods - Select the allowed methods for approving MFA requests
    • Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional)

Acceptto SAML configuration

  1. Under the SAML Service Provider Configuration tab, enter the following values:
    • Issuer or Entity ID – The Issuer/EntityID of your Atlassian Cloud can be copied from the Atlassian SAML configuration section.
    • Sign in URL - The link used by your users to access the Atlassian Cloud.
    • NameID Format - Email Address
    • Name Identifier - Email
    • ACS URL - The Assertion Consumer Service can be copied from the Atlassian SAML configuration section.

Atlassian SP information

Acceptto SAML configuration

  1. Click Save.

Test Your Setup#

  1. Go to your Atlassian login portal.
  2. You will be redirected to the Acceptto SSO page.

Login to Atlassian cloud

  1. After successful authentication, you’ll see the Acceptto MFA options and need to select your desired method.

Acceptto MFA

  1. Finally, you will be redirected to the Atlassian cloud portal page via an easy and passwordless authentication method.

Support#

If you require assistance, please email us at support@acceptto.com

Sales#

Want to learn more about our MFA solutions? Contact our Professional Services for a Demo today.

Disclaimer#

All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the Acceptto Corporation.