Thanks for your inquiry. One of our representatives will get in touch with you shortly via email.
Centrify Single Sign On (SSO) for Bitbucket
miniOrange provides a ready to use solution for Bitbucket. This solution ensures that you are ready to roll out secure access to your Bitbucket site using Centrify within minutes.
Follow the Step-by-Step Guide given below for Bitbucket Single Sign On (SSO) using Centrify as IdP
STEP 1: Configuring Centrify as IdP
Log into Centrify as an Administrator and go to Apps from the NavBar. Click on Add Web Apps.
In the pop-up, click on Custom tab and then click on the Add button next to SAML.
In the new SAML App that you created under Application Settings section, enter Assertion Consumer Service URL as provided in the Step 1 of the plugin under Configure IDP tab
Under User Access section, select roles that can access this app.
Under Advanced section, pass the following parameters to the functions in the code:
NOTE: Please do NOT change any other function calls.
Under Application Settings section, scroll down to Identity Provider Info. Keep this information handy for configuring the plugin.
Click on Download Signing Certificate to download the Signing certificate.
STEP 2: Configuring Bitbucket as SP
In miniOrange SAML plugin, go to Configure SP Tab. Enter the following values:
IDP Entity ID:
Issuer from Identity Provider Info in your Centrify SAML App
Single Sign On URL:
Identity Provider Sign-in URL from Identity Provider Info in your Centrify SAML APP.
Single Logout URL:
Identity Provider Logout URL from Identity Provider Info in your Centrify SAML APP.
Open the .cer certificate file in notepad and copy/paste the entire content of the file.
In miniOrange SAML plugin, go to Attribute Mapping tab. Enter the following values:
Name of the username attribute from IDP (Keep Username as NameID by default)
Name of the email attribute from IDP (Keep Email as NameID by default)
Name of the firstname attribute from IDP
Name of the lastname attribute from IDP
Go to Group Mapping tab. Enter the following values:
Name of the Group attribute from IDP
You can check the Test Configuration Results to get a better idea of which values to map here.
Under the Group Mapping Section, configure which GROUP value coming in the SAML response needs to be mapped to which group. The Group value coming in the SAML response will be mapped to the Group assigned here and the user will be assigned that group.
Go to Sign In Settings tab. Enable auto-redirect to IDP using Disable Bitbucket login option.