SSO for Atlassian Applications connected to Crowd

Crowd is a centralized identity and access management application that manages the users from multiple directories like Active Directory, LDAP, Open LDAP, Microsoft Azure Active Directory for connected applications such as Jira, Confluence etc.

Now, organizations are looking to delegate user authentication for Atlassian applications from Crowd to central IAM (Identity & Access Management) applications for better security and allow their users to seamlessly access all the applications including Jira, Confluence, Bitbucket, etc using the single IAM session. 

There are multiple solutions available to achieve these requirements:

  1. In case you have an Atlassian Data Center application, you can integrate each application with IAM for SAML SSO using the application’s built-in SSO 2.0 functionality. 
  2. In case you have a Server version or looking for customization and other features not present in built-in SSO 2.0, take a look at the SSO plugins available on the Atlassian Marketplace.
  3. Use Crowd for SSO, user and permission management and don’t want to integrate applications directly with IAM. 

Here we will be focusing on the third solution only, using this solution, all authentication requests and responses to and from Atlassian applications will go through the Crowd server and user authentication will be handled by the IAM while the Crowd will still be used to manage users and their permission for the Atlassian applications.


How does the miniOrange plugin handle this use case?

We developed a SAML Single Sign-on app for Crowd Server that allows it to integrate with any SAML complaints IDP for SAML Single Single Sign-on.

Along with the Crowd SAML Plugin, we have developed its connector add-ons for the Atlassian application, which allows the Crowd SAML SSO plugin to enable SSO and connected Atlassian applications such as Jira, Confluence, Bitbucket, Bamboo, and Fisheye. Here, users don’t need to login to Crowd for SSO to work, they can directly SSO from their Jira or Confluence application.

 

Crowd SSO Plugin and it’s Connectors:

  1. Crowd SAML SSO plugin
  2. SSO Connectors for Crowd and JIRA
  3. SSO Connectors for Crowd and Confluence
  4. SSO Connectors for Crowd and Bitbucket
  5. SSO Connectors for Crowd and Bamboo
  6. SSO Connectors for Crowd and Fisheye

 

How does it work?

Crowd SAML SSO Plugin acts as a SAML Service Provider and is used to enable trust between Atlassian applications and central IAM applications. Crowd SAML SSO plugin takes care of the SAML Request, SAML response, and user’s session management across all the Atlassian applications, and using the SSO connector, users will be able to invoke SSO directly from the Atlassian applications itself.

Here, user authentication will be done by the IAM and Crowd will still be used to manage users and their groups (permissions) for all the connected Atlassian applications.

Also, with this flow, end-users will experience a seamless login and won't be able to notice that the SSO request and response passes through the Crowd Server. 

 

Let’s understand the Workflow!

  1. User tries to access the application i.e., Jira tickets, Confluence pages, etc
  2. User will be redirected to the IAM application’s login page for authentication  
    1. Users will be redirected to the Crowd SAML plugin.
    2. Crowd SAML plugin will redirect the user to the IAM application for authentication.
  3. Once the authentication is done, the user will be redirected back to the Atlassian application and logged in.
    1. IAM sends a response back to Crowd SAML plugin
    2. Crowd SAML plugin validates the user creating the user session, and redirects the user to the respective application from where the SSO was invoked.
    3. Users will be granted access to the application based on their groups and applications configured on Crowd.

 

What are the Key Benefits?

  1. There is only one set of SAML configurations for all the Atlassian applications.
  2. User authentication is moved to central IAM without losing any of the existing user permissions.
  3. Users will be able to access all applications (Atlassian and Non-Atlassian applications) using their IAM credentials.
  4. This solution made setup easy to enforce an additional security layer like MFA on top of the SSO which was not possible while using Crowd for Single Sign-On.

 

What do you think of this solution? Do you think this would be helpful in centralizing authentication for your users? Drop us a mail at info@xecurify.com or raise a ticket here to talk to us.

1 comment

M Amine
Community Leader
Community Leader
Community Leaders are connectors, ambassadors, and mentors. On the online community, they serve as thought leaders, product experts, and moderators.
June 9, 2021

Amazing article to read

Comment

Log in or Sign up to comment
TAGS
AUG Leaders

Atlassian Community Events