What's New !!

Pricing Offers

We are happy to announce special offers for miniOrange Atlassian SSO, 2FA, REST API, User Sync and Group Sync Apps.

Contact Info

For any query, product related information or any help , contact us now. You can also raise a ticket with our support.

 

Contact Us Now

SSO for JSM Customers using AWS Cognito as OAuth Provider


The first step is to set the branding, this configuration is necessary to display the login page with your company domain instead of the default miniOrange domain. You can follow this guide to setup your branding.
Once your branding is set now we can go ahead and add your AWS Cognito OAuth/OIDC application, to do so follow the below steps:-


1: Setup AWS Cognito as an Identity Provider in miniOrange



  • Navigate to Identity Providers tab.
  • Setup JSM SSO broker flow
  • Click on Add Identity Provider.
  • Setup JSM SSO broker flow
  • Choose OAuth2.0 from the tab items.
  • Setup JSM SSO broker flow
  • Choose Custom Provider from the IDP Name dropdown list.
  • Setup JSM SSO broker flow
  • Enter the display Name for your Identity Provider.
  • Now, you’ll need to enter the OAuth Authorize Endpoint, OAuth Access Token Endpoint and OAuth Get User Info Endpoint.
  • - OAuth Authorize Endpoint: https://${your AWS Cognito Domain}/oauth2/default/v1/authorize
    - OAuth Access Token Endpoint: https://${your AWS Cognito Domain}/oauth2/default/v1/token
    - OAuth Get User Infor Endpoint:https://${your AWS Cognito Domain}/oauth2/default/v1/userinfo

  • Copy your Client ID and Client Secret from your AWS Cognito application and paste it at respective input box.
  • Choose Authorization Code Grant in the Grant Type Option.
  • Enter openid profile email in the Scope input box.
  • Check the Enable for EndUser Login option.
  • Copy the OAuth Callback URL, you’ll need to enter this in your AWS Cognito Application.
  • Click on save.
  • Setup JSM SSO broker flow

2: Setup AWS Cognito as OAuth Provider

  • Sign in to AWS Amazon.
  • Setup JSM SSO broker flow
  • Search for Cognito in the AWS Services search bar as shown below.
  • Setup JSM SSO broker flow
  • Navigate to the User Pool section in AWS Cognito.
  • Setup JSM SSO broker flow
  • Select the appropriate User pool and navigate to the Apps Integration section.
  • Setup JSM SSO broker flow
  • Scroll down to the App Clients section and click on Create App Client button.
  • Setup JSM SSO broker flow
  • Enter the App client name and scroll down.
  • Setup JSM SSO broker flow
  • Copy the Callback URL from the miniOrange dashboard and paste it in the Allowed Callback URLs input box.
  • Setup JSM SSO broker flow
  • Scroll Down and click on Create App Client.
  • Setup JSM SSO broker flow
  • Choose the newly created app client.
  • Setup JSM SSO broker flow
  • Copy the client ID and Client Secret and navigate to the miniOrange dashboard
  • Setup JSM SSO broker flow
  • Paste the client ID and Client Secret in the respective input box in the miniOrange dashboard.
  • Setup JSM SSO broker flow
  • Navigate to the newly create IDP in the miniOrange dashboard and click on edit.
    Enter the OAuth Access Token and User Info end point as below:-
  • - https://{cognito domain}/oauth2/authorize
    - https://{cognito domain}/oauth2/token

    Setup JSM SSO broker flow
  • To get the cognito domain navigate to the Client application created in aws cognito and copy the domain as shown in the below image.
  • Setup JSM SSO broker flow

3: Test The Connnection

  • Navigate to the Identity Provider section.
  • Choose the select option and click on Test connection for the respective IDP.
  • You should see a successful response along with the Attributes.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Now, you can proceed creating an Application within the miniOrange.

4: Create an Application in miniOrange

  • Navigate to the Apps tab.
  • Click on Add Application.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Select SAML/WS-FED application type.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Enter Custom SAML APP.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Copy the SP Entity ID and ACS Url from the SSO configuration tab provided in the SSO for JSM Customers plugin.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Paste the SP Entity Id and ACS URL as shown in the below image.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Click on Save.
  • Now, click on the edit option from the list of IDP as shown in the below image.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Set the Primary Identity Provider to miniOrange in order to access the miniOrange login page. This page will contain various options for the end user to select the desired Identity Provider (IDP) for authentication. Alternatively, you can set it to your Cognito domain to directly redirect the user to your IDP.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application

5: Configure the SSO for JSM Customers

  • Click on the select dropdown and choose the metadata option for the corresponding application.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Click on the metadata URL button as shown in the below image, you will be redirected to the new tab copy the URL.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Navigate to SSO for JSM Customers plugin and click on the Import Metadata option, paste the URL you copied in the previous step.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • Click on Test connection.
  • OAuth/OpenID/OIDC Single Sign On (SSO), AWS Cognito SSO Login Add Application
  • You will be redirected to choose the IDP you want to be authenticated with, once you select the IDP you will be redirected to the IDP’s login page. Upon successful authentication you will see a success response containing the configured Attributes.

Recommended Add-Ons