We are happy to announce special offers for miniOrange Atlassian SSO, 2FA, REST API, User Sync and Group Sync Apps.
You can now allow External Customers to login into Jira Service Management (previously Jira Service Desk or JSD) via SSO! Integration with various customer portals like Atlassian Service Management and access tickets with the help of SAML SSO for JSM Customers.
Follow the steps below to configure Okta as an Identity Provider
Configuring Okta as IdP
|Single Sign On URL||Enter ACS (AssertionConsumerService) URL from the Service Provider info tab of the module.|
|Audience URI (SP Entity ID)||Enter SP Entity ID / Issuer from the Service Provider info (or SP Information) tab of the module.|
|Default Relay State||Enter Relay State from the Service Provider info tab of the module.|
|Name ID Format||Select E-Mail Address as a Name Id from dropdown list.|
|Application Username||Okta username.|
To configure the IDP manually, you will need to have the following details from your IDP's metadata.
Once you have added the IDP metadata, click on Save. If the IDP has been added successfully, Click on the Test Configuration button to test if the IDP was added successfully.
Enable 2FA/MFA for users & groups and let users configure 2FA during their first login.
Synchronize users, groups & directory with SCIM & REST APIs for Server/DC.
Secure your JIRA Data Center/Server REST API using API Tokens.