Current setup:
We have a Azure environment and want to have SSO using our Azure AD for Jira and Confluence hence wanting to use the Atlassian Access application.
But...
Currently we sign into Jira and Confluence Cloud using our Gmail accounts which we are using for our email services (will be migrating to Exchange Online), but they are the same as the credentials for Azure. We are in the process of slowly migrating away from Google Workspace to a full Microsoft environment.
My question is?
Once we setup Atlassian Cloud/Access with Azure AD. When it syncs the user data will there be a conflict because the user login's are already in Atlassian because of Google? Will it delete all the user accounts and replace them with Azure AD users and would we have to setup all the permissions again and what about Admin access in Atlassian, will we lose this. will we have to create a new Atlassian admin account in Azure to cover this?
Some some questions:
Does it sync groups and can you specify what groups from Azure and if you add members to the to the groups does this then get sync'd later?
Can we then assign rights to the groups in Atlassian to stop having to assign rights to individual users.
Hope this is understandable
Hi, Rachel.
I hope you and your family are safe and well.
Based on your description, the email at Google Workspace and Azure will be the same, is that correct?
It is also important to mention that we have two different integrations you can do with Azure:
- SAML SSO : changes how the users authenticate to Atlassian and sync some of the accounts details such as email, name, and last name.
- User Provisioning : sync users and groups from your Identity Provider to your Organization and the sites below it
Now, to your questions:
I hope this clarifies your questions.
Let me know if you have any additional one.
João Nunes
Atlassian Cloud Support
Hi João,
Thank you for the detailed reply and information.
I've done reading around both the SSO and User Provisioning (Microsoft documentation) and it seems we can setup SAML SSO first and then do the User Provisioning setup afterwards so as to get the benefits of SSO and User Provisioning. I appreciate the mapping of the attributes for SSO and User Provisioning is different.
"If you have previously setup Atlassian Cloud for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially." - Taken from Microsoft documentation around User Provisioning.
https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/atlassian-cloud-provisioning-tutorial?source=docs
As we are trying to make the authentication as secure as possible for all users but at the same time make management of users simpler via Azure so hopefully we can incorporate both SAML SSO and User Provisioning as it seems to allow it.
If you think this will not not work your feedback will be helpful
Regards
Rachel
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
This will work but this is a mistake.
Groups you assign to the Atlassian Cloud application in Azure affect BOTH who are allowed to sign-in and who is provisioned. You'd think these should always be the same, but in real enterprise scenarios this is not always true.
If you have a security breach associated with one of the users – you'd want to lock them out immediately, but you will want to keep their product groups intact, so you can investigate i.e. to identify what they could have possibly have access to.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Please review these threads also, these might help:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
This is what I share with our customers:
Here are our recommendations on how to configure Cloud site and Atlassian Access integrated with Azure AD.
1) A lot of features in Cloud User Management, and access setup are aiming to make it easier for non-enterprise users to set everything up.
In the presence of Atlassian Access provisioning a lot of these features are actually make it harder to manage everything from Azure AD.
As such it is recommended to tighten up the setup of Atlassian Cloud site as much as possible, so, at least for the regular users, the control over who gets access to what is fully on the side of Azure AD.
All of the above ensures that users can only get access via Azure AD. Once a user is provisioned, with some groups listed in Product Access, they are given site access. When they are deprovisoined they lose access.
A site admin can elevate someone else to a site-admin or administrators level – but this will only allow you to administer site or get into administrators section of the product e.g. to review how setup is done.
2) We recommend having two instances of "Atlassian Cloud" Enterprise application in Azure AD – one solely responsible for SSO and the other solely for User Provisioning.
Mainly this is from the desire to separate concerns, e.g., during a security breach investigation – deny someone SSO, effectively locking them out from Atlassian Cloud (temporarily), while not touching their provisioned user and the groups associated with that. If the groups used for provisioning are directly assigned to to the application responsible for SSO – removing the user from a group trying to deny them SSO will trigger deactivation of the user via User Provisioning.
The need for two applications in Azure stems from this too – since for a single application the assigned groups apply to both SSO and User Provisioning.
If you ever start running Jira Service Management – you will need to be able to give access to Cloud without giving access to products for Portal Only users.
3) SSO to Atlassian Cloud is Cloud-wide – it encompasses users outside of your single site, e.g. users from your own other sites, Bitbucket and Trello users, as well as users who require access to other Atlassian Cloud services, e.g. University or Community.
4) Both User Provisioning and SSO sides of configuration in Azure AD need to be reviewed due to the fact that Atlassian uses email of the user for everything:
For the app responsible for SSO in Azure AD:
For the app responsible for User Provisioning in Azure AD:
5) A new user created in Azure AD or a user after rename/change of email or/and UPN should wait for the provisioning to push the changes to Cloud (Azure AD does it only every 40 minutes)
6) For traceability, admins in Atlassian Cloud should never trigger deletion of a previously active real user in Atlassian Admin UI – only deactivate.
Deleting a user in Azure AD or removing them from all groups assigned to the app responsible for User Provisioning in Azure AD will automatically trigger deactivation on Atlassian Cloud side, not delete.
7) To avoid being locked out if SSO is malfunctioning, it is recommended to have at least one org-admin and site-admin account from another domain, e.g., if we are supporting you in the Cloud – one of techtime accounts. They are all attached to real users, with Atlassian's own 2FA and strong passwords enforced. We use aliasing to avoid logging into one customer and accidentally changing something for another customer.
Creating a special "break glass" account in your own domain and assigning it to no-SSO policy in Atlassian Access is not recommended as this effectively circumvents the very security controls you are trying to implement with SSO via Azure AD.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Ed,
Thank you for detailing it and making it very easy to follow. I appreciate the help and I will be taking your advice and implementing it as you recommend.
It's made things a lot easier now as I now understand the difference between SSO and User Provisioning for Atlassian/Azure.
Rachel
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Ed,
I second Rachel Coles appreciation! It's been about a year since your shared your recommendations for configuring Cloud site and Atlassian Access integrated with Azure AD. We are about to implement the same integration.
Are there any updates or new considerations you would make today?
Sean
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi, @Sean Thorburn I do not think anything has changed.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi All,
Here are my steps I will be doing to integrate Atlassian with Azure AD
Please check to make sure I'm going it in the right order and correctly before I implement it
Step 1
Step 2
Step 3
Create groups in Azure AD
Step 4
Step 5
Attribute matching between Atlassian and Azure for SSO:
Atlassian attribute | Azure AD attribute | Comments |
name | UPN or anything | Can be anything but recommended to use UPN to match Username in Azure AD |
email address | Must be the users email address in Azure AD | |
Unique User Identifier | email address | Must be the users email address in Azure AD |
Testing SSO with Atlassian and Microsoft:
Step 6
Step 7
Attribute matching between Atlassian and Azure for User Provisioning:
Atlassian attribute | Azure AD attribute | Comments |
username | UPN or anything | Can be anything but recommended to use UPN to match Username in Azure AD |
email address | Must be the users email address in Azure AD | |
externalId | objectId | MUST be selected as the one used for user record matching ("Matching Precedence" = 1) – this will allow you to change the UPN, or email at will but keep Cloud in sync |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi
We are on a similar path, ie moving grom Gsuite to Azure AD users, so i will follow this thread closely.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.