You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
This post will demonstrate how to provision users and allow single sign-on (SSO) access into Atlassian Cloud with JumpCloud, an officially supported IdP for Atlassian.
In order to begin there are a few prerequisites to set you up for success including:
Steps 1-3: Walks through how to configure SSO through SAML 2.0
Steps 4-5: Walks through how to configure automatic user provisioning through SCIM
Step 1 - Configure Your Atlassian Cloud Application in JumpCloud
Step 2 - Setting Up SSO in JumpCloud
Within the application configuration next click on the ‘SSO’ tab. Here we will configure the SAML 2.0 settings to allow users SSO access in their JumpCloud user portal. To begin:
Step 3: Configure Atlassian Access
Finish Configuring the JumpCloud SSO Application
Step 4: Set Up User Provisioning & De-provisioning
In the Atlassian Admin tab, ensure that you have verified your domain (this can take up to 72 hours to verify).
Step 5: Enable Atlassian Identity Management in JumpCloud
The following table lists attributes that JumpCloud sends to Atlassian Cloud.
JumpCloud UI Attribute Name
Value and Validation in JumpCloud
Atlassian Cloud Attribute
active:false = inactive
SCIM user id
phoneNumbers: type [=work phone “business”]