Showing results for 
Search instead for 
Did you mean: 
Sign up Log in

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root


1 badge earned


Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!


Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.


Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!


Configure SAML 2.0 for Jira Align using Okta

Okta is a popular SAML 2.0 service. The following is an example of how we have tested and configured Okta with Jira Align. Please review the following example and adjust as needed for your organization's security policies and practices. 



1. Sign into Okta and click Applications in the top menu.


2. Click the Create New App button on the far right. This will be a SAML 2.0 Web Application.


3. App Name: Name the application something relevant to your organization. This name is just for identification and not specific to setting up SAML 2.0. In the example, we have named it Jira Align

4. Click Next.

5. Fill out the Single Sign On URL and Audience URI (SP Entity ID) with your Jira Align URL.

Example: or

6. Name ID Format will be either EmailAddress or ExternalID.


7. Click Next and Finish.

8. In the new application, click Sign On and View Setup Instructions.

9. Copy the metadata from the section - Provide the following IDP metadata to your SP provider to a text editor for later.

10. Make a note of the Identity Provider Single Sign-On URL for later.


11. Click on Assignments > Assign and Assign People and/or Groups as needed. You will need at least one person assigned to test.


For additional information, please consult Okta's integration documentation.


Jira Align

12. Sign into Jira Align and click Administration > Platform > Security.


13. Click Add SAML Provider. 


14. Paste in the SAML 2.0 Metadata from Okta (Step 9 from earlier).

15. NameID Lookup By will be set to match Okta (Step 6 from earlier).

16. Click Save & Close.

17. Set Enable SSO to Yes.

18. Click Save Settings.



19. Open up an incognito window in your browser and navigate to the Identity Provider Single Sign-On URL from Okta (Step 10 from earlier). 


Additional Notes

  • The user account you are testing from Okta SAML 2.0 must be also configured on the Jira Align side.
  • User accounts on the Jira Align side can be created using the following methods:
    • API 1.0
    • Excel Import
    • Manually created
    • Users automatically integrated from Jira (the user must be assigned to an integrated issue)


Disable Manual Sign In

  • Once you are confident that there are no known issues with SSO, you can go back to Platform Settings from earlier and set Disable Manual Sign In to Yes. 

You'll need to open a ticket with Jira Align to regain access if you get locked out while Disable Manual Sign In is turned on. 

  • After you have set Disable Manual Sign In, you'll be able to fill out the following field:
    • Sign In URL (use the URL from step 10)

If for some reason your Sign In or Sign Out URL contain encoded characters (Example: %20 for space), you'll need to replace that with the non-encoded equivalent.

1 comment

Important: When bringing over metadata XML from Okta, you will need to manually remove XML prefixes from each element, for example "md:" and "ds:".

Like # people like this


Log in or Sign up to comment
AUG Leaders

Atlassian Community Events