Note : The information contained on this page does not create a joint venture, partnership, agency or other form of association, or an express or implied license grant by either party to the other under any patent, trademark, copyright, trade secret or other intellectual property right.
miniOrange provides secure access to Confluence for enterprises and full control over access of applications, Single Sign On (SSO) into Confluence with one set of login credentials.
Confluence Single Sign On addon:
SAML Single Sign On (SSO) for Confluence allows users sign in to Confluence Server with your SAML 2.0 capable Identity Provider. We support all known IdPs - miniOrange, Google Apps, ADFS, Okta, OneLogin, Azure AD, Salesforce, Shibboleth, SimpleSAMLphp, OpenAM, Centrify, Ping, RSA, IBM, Oracle, Bitium, WSO2, NetIQ etc.
SAML Single Sign on (SSO) acts as a SAML 2.0 Service Provider and securely authenticate users with your SAML 2.0 Identity Provider.
Features of Confluence Single Sign On addon:
- Unlimited Authentications via IDP
- Single Sign-On button on login page
- Step-By-Step Guide to Setup your IdP
- Auto-create users in Confluence
- Advanced Attribute Mapping
- Advanced Role Mapping
- Enforce login with IDP
- SAML Single Logout
- Datacenter support
- Support for Multiple SAML IDPs*
* This is a PREMIUM feature with separate licensing. Contact us at email@example.com to get licensing plans for this feature.
Here are the Step by Step Guides to set up Jboss Keycloak, Bitium, G Suite, Centrify as IDP for Confluence.
How miniOrange supports Single Sign On Login for Confluence on Mobile Devices
Confluence mobile version don't allow cookies which can produce issues like redirect loop where even if user is logged into confluence the user is redirected to IdP for authentication. miniOrange Single Sign on for Confluence module take care of this. We provide support for Apple and Android phones and you can login to your Confluence wiki page from Mobile browser. You won't see any redirect issue even if site protection is enabled. After successfully logging in you won’t get stuck in a redirect loop and you can view and manage your tasks on your phone and other mobile devices too.
In order to setup SSO for Confluence, you need to follow these steps:
Step 1: Download and installation
- Login as administrator in Confluence.
- Click the admin dropdown and choose Add-ons.
- The Manage add-ons screen loads.
- Click Find new add-ons from the left-hand side of the page.
- Locate SAML Single Sign On for Confluence via search.
- Results include add-on versions compatible with your Confluence instance.
- Click Install to download the add-on.
Step 2: Configuring the plugin
- Using IdP information user could add details in Configure SP.
- Provide the required settings (i.e. IdP Entity ID, IdP Single SignOn Service Url, X.509 certificate) in the plugin and save it.
|IdP Entity Id||https://auth.miniorange.com/moas|
|Single Sign On URL||https://auth.miniorange.com/moas/idp/samlsso|
|Single Logout URL||https://auth.miniorange.com/moas/idp/samllogout|
|Identity Provider Certificate||Upload the certificate downloaded from miniOrange Admin Console|
Any help needed related to configuring IdP contact us at firstname.lastname@example.org or call us at +1 978 658 9387.
Step 3: Test Configuration
- Click on the Test Configuration button to perform SSO and fetch user attributes from IdP.
- The below screenshot shows the successful result.
- This screenshot shows the attributes that are received and are mapped by attribute mapping.
Step 4: Attribute Mapping
- Attribute Mapping helps you to get user attributes from your IdP and map them to Confluence user attributes.
- Please refer to attributes received in successful Test congiguration and use them for Attribute Mapping.
- In Attribute Mapping details like username and NameID as shown in step 4 of Test Successful are mapped to Username and Email respectively.
- Also Full Name or Separate Name(i.e First and Last Name)attributes are given as options according to Confluence user attributes
- While auto registering the users, these attributes will automatically get mapped to your Confluence user details.
- Clicking Keep Existing User Attributes checkbox will disable attribute mapping for existing users. New users will be created with attribute mapping defined.
Step 5: Group mapping (optional)
- Confluence plugin assigns roles to groups which are mapped against those Confluence groups.
- Confluence uses a concept of Groups, designed to give the site owner the ability to control what groups can and cannot do within the site.
- In Role Attribute enter the Attribute Name given against role value of Test Configuration for the user.
- Clicking Create Users checkbox will allow user creation for only those roles whose role is mapped to Confluence groups in Role Mapping tab. If unchecked, users whose roles are not mapped to Confluence groups, they will not be allowed to login.
- Confluence has two pre-defined groups where users are mapped: Confluence-administrator and Confluence-servicedesk-users.
- Role mapping helps you to assign specific roles to users of a Confluence group from your IdP.
Step 6: SSO Sign In Settings
There are different ways to login to your Atlassian Confluence Website.
- Login Button Text make your organization's SSO easy for Confluence users to recognize.
- You also have option to disable your Confluence login by clicking Disable Confluence Login checkbox. If your Confluence Login is disabled all users will be redirected to IdP for login.
- Enable backdoor checkbox allows Administrators to bypass external authentication and log in with a Confluence administrator using user name annd password. Note: a logged-in user cannot access this page only a logged out user can.
For further details refer :
Business trial for free
If you don't find what you are looking for, please contact us at email@example.com or call us at +1 978 658 9387 to find an answer to your question about Atlassian Single Sign On (SSO).