An In-depth Guide to Atlassian Cloud OAuth Single Sign-On (SSO) with AWS Cognito

Atlassian Cloud OAuth Single Sign-On (SSO) with AWS Cognito

With Jira OAuth Single Sign-On (SSO) for Atlassian Cloud, you can securely log in to Atlassian Cloud using your AWS Cognito credentials. This app allows you to implement seamless Single Sign-On (SSO) for Atlassian Cloud accounts using existing AWS Cognito credentials.

Pre-requisites

  1. Atlassian Guard (Atlassian Access) Subscription:
    Atlassian Guard is an additional subscription applied across the Atlassian Cloud products, like Jira Software, Jira Service Management, Jira Work Management, Confluence, and Bitbucket. It is needed for Single Sign-On (SSO) or any Cloud Service across Atlassian Cloud products.
  2. Domain Verification:
    Atlassian Guard requires the Domain Verification process to enforce SSO on the managed user accounts. This process verifies that you own a valid domain for managing the user accounts and use the same domain name for the email addresses.

Download and Installation

  • Log in to your Atlassian Admin Console and select your site.
  • Now, in the left sidebar, scroll down to the Apps section. Under Apps, select Site, which will open the site settings page.
  • In the Site Settings, navigate to Connected Apps → Explore apps. (Alternatively, you can go to the Atlassian Marketplace and search for the app.)
  • Search for miniOrange OAuth/OpenID SSO.
  • Click “Try it free” to begin a new trial of the app.
  • On the top menu bar, go to Apps.
  • Locate the “mO Jira OAuth/OpenID SSO” app and click to open it.

In this guide, we will demonstrate the setup in three parts:

  1. Configure OAuth SSO connection between miniOrange App (as OAuth Client) and AWS Cognito (as OAuth Provider).
  2. Configure SAML SSO connection between Atlassian Guard (as SP) and miniOrange App (as IDP).
  3. Add users to the SSO Authentication policy, and enforce the SSO.

Step 1. Configure SSO between miniOrange App and AWS Cognito

  • Once the plugin is installed, select the Apps section from the sidebar menu and click on mO Jira OAuth/OIDC SSO option.
  • Jira app main menu with the Apps section open and the mO Jira OAuth/OIDC SSO app highlighted
  • Next, you will be prompted with a welcome pop-up window. Click Start Configuration.
  • Welcome window of mO Jira OAuth/OIDC SSO app.
  • Now, in the Configured Providers section, click the "Add Provider" button.
  • Configured providers section in the mO Jira OAuth/OIDC SSO app
  • Select AWS Cognito as the application.
  • And copy the callback URL from the OAuth / OIDC Provider Configurations page and keep it handy, as you'll need it to configure AWS Cognito as the OAuth provider.
  • OAuth / OIDC Provider Configurations tab in the mO Jira OAuth/OIDC SSO app
  • After copying the callback URL, sign in to AWS Amazon.
  • AWS IAM user sign in page
  • Search for Cognito in the AWS Services search bar as shown below.
  • AWS Services search bar with Cognito option highlighted
  • Click on Create a User Pool button to create a new User Pool.
  • Create a User Pool button in the AWS Amazon Cognito User Pools page
  • Select the Application type as Traditional web application. Provide a name for your application and choose the required attributes.
  • Define your application page in the AWS Amazon Cognito User Pools page
  • Add the callback URL in the Return URL field, click Create.
  • Configure options and add return URL page in the AWS Amazon Cognito User Pools page
  • Scroll down and click on the Go to Overview button.
  • Setup your application page in the AWS Amazon Cognito User Pools page
  • Go to Authentication methods and click the Edit button in the Email.
  • Authentication methods page in the AWS Amazon Cognito User Pools page
  • Enter the email address where the message will be sent and click Save Changes.
  • Edit email configuration page in the AWS Amazon Cognito User Pools page
  • Go to App Clients and either select or create a new App Client.
  • App clients and analytics page in the AWS Amazon Cognito User Pools page
  • Copy the Client ID and Client Secret and keep it handy for later use.
  • App client information page in the AWS Amazon Cognito User Pools page
  • Go to Attribute permissions, click Edit and choose desired attributes. Once done, click Save.
  • Attribute permissions page in the AWS Amazon Cognito User Pools page
  • In the Login pages tab, click Edit.
  • Login pages tab in the AWS Amazon Cognito User Pools page
  • Add the Callback URL in the respective field. Select Cognito user pool, Authorization code grant, and scopes (such as, Email, OpenID, Profile). Then click Save Changes.
  • Allowed callback URLs page in the AWS Amazon Cognito User Pools page Login pages configuration page in the AWS Amazon Cognito User Pools page
  • Go to the Users tab, then click Create user.
  • Users section with Create user button in the AWS Amazon Cognito User Pools page
  • Enter user details like email, phone number, and password. Click Create user.
  • User information page in the AWS Amazon Cognito User Pools page
  • Now, return to the miniOrange App configuration page. (OAuth / OIDC Provider Configurations )
  • Enter Client Id, client secret & domain url as {your domain name}.auth.{region name}.amazoncognito.com
  • And configure the scope as openid, email, etc., and click Save Configuration.
  • mO Jira OAuth/OIDC SSO app configuration page where Client ID, Client Secret, domain url, and scopes can be entered

Step 2. Set up SSO between Atlassian Guard and miniOrange App

After saving the OAuth Configuration, you’ll be required to configure Atlassian Guard and the miniOrange OAuth/OIDC SSO App.

  • A pop-up notification will appear, asking you to complete the Atlassian Guard configuration.
  • Pop-up notification asking to complete the Atlassian Guard configuration
  • Click on Configure Guard, and you will be navigated to the Guard Configurations section.
  • In this section, you will find the Plugin Metadata details.
  • Copy and keep the following values handy. You’ll need them while setting up your Identity Provider in Atlassian Guard:
    • IDP Entity ID
    • IDP SSO URL
    • IDP Public X.509 Certificate
    • Atlassian Guard configurations page where Plugin Metadata details can be found
    1. Open the Atlassian Admin Console and navigate to the Security tab.
    2. Note: In case you manage multiple organizations, you’ll have to select the intended one after accessing the admin console.
    3. Under User Security, click Identity Providers.
    4. Select Other to begin configuring a custom Identity Provider.
    5. Atlassian Guard security page where Identity Providers section can be found
  • Provide an appropriate name, select Set up SAML Single Sign-On, and click Next.
  • Now, paste the IDP Entity ID, IDP SSO URL, and Public X.509 Certificate that you copied from the plugin configuration.
  • Atlassian Guard configurations page where IDP Entity ID, IDP SSO URL, and Public X.509 Certificate can be pasted
  • Click Next and copy the Service Provider Entity ID and Service Provider Assertion Consumer Service URL. Keep these handy as they’re required to complete the plugin configuration.
  • Complete the rest of the Atlassian Guard configuration.
  • Once you’re done, return to the plugin, go to the SP Metadata tab in the Guard Configurations section, and click Next.
  • Enter the SP Entity ID and Assertion Consumer Service (ACS) URL that you copied, and click Save Settings.
  • Atlassian Guard configurations page where SP Metadata tab can be found

Step 3: Configure SSO Authentication Policy

Once all the SSO Configurations are done, you need to add users to the Authentication Policy and enforce Single Sign On.

After saving the SP Metadata, click Next to find the steps for adding the users to the Authentication policy.

Atlassian Guard configurations page where Authentication Policy tab can be found

Now you can now seamlessly enjoy Single-Sign On into Atlassian with your preferred OAuth provider, with our miniOrange app.

OAuth Saml App

Did this page help you?

miniOrange Atlassian Contact Us

Book a Free Consultation with
Our Experts Today!

Schedule a call now!


Contact Us