If you dont hear from us within 24 hours, please feel free to send a follow up email to email@example.com
ADFS Single Sign On (SSO) for Bitbucket
miniOrange provides a ready to use solution for Bitbucket. This solution ensures that you are ready to roll out secure access to your Bitbucket site using ADFS within minutes.
Follow the Step-by-Step Guide given below for Bitbucket Single Sign On (SSO) using ADFS as IdP
STEP 1: Configuring ADFS as IdP
In ADFS, click on Add Relying party Trust. Then click on Start.
In Select Data Source: Select Import data about the relying party published online or on a local network and enter the metadata URL provided in the Configure IDP tab of the plugin. Click Next.
In Specify Display name: Enter Display name. Click Next.
In Configure Multi-factor Authentication Now, select I do not want to configure multi factor authentication settings for this relying party trust. Click Next.
In Choose Issuance Authorization Rules, select Permit all users to access this relying party. Click Next.
In Ready to Add Trusts, select click Next.
Check Open the Edit Claim Rules dialog and click close. Click Add rule and then select Send LDAP Attributes as Claims. Enter the following:
Claim rule name:
Outgoing Claim Type:
STEP 2: Configuring Bitbucket as SP
In miniOrange SAML plugin, go to Configure IDP Tab. Enter the following values:
IDP Entity ID:
Single Sign On URL:
Single Logout URL:
Paste the certificate value you copied from the ADFS Metadata file.
In miniOrange SAML plugin, go to User Profile tab. Enter the following values:
Name of the username attribute from IDP (Keep Username as NameID by default)
Name of the email attribute from IDP (Keep Email as NameID by default)
Name of the firstname attribute from IDP
Name of the lastname attribute from IDP
Go to User Groups tab. Enter the following values:
Name of the Group attribute from IDP
You can check the Test Configuration Results to get a better idea of which values to map here.
Under the Group Attribute Section, configure which GROUP value coming in the SAML response needs to be mapped to which group. The Group value coming in the SAML response will be mapped to the Group assigned here and the user will be assigned that group.
Go to Sign In Settings tab. Enable auto-redirect to IDP using Disable Bitbucket login option.
We offer Security Solutions of Single Sign-On, Two Factor Authentication, Fraud Prevention and much more.
Please call us at +1978 658 9387 (US), +91 77966 99612 (India) or email us at firstname.lastname@example.org