AKKU

SSO for Jira

Overview

Akku, developed by CloudNow Technologies, is a robust Identity & Access Management (IAM) solution designed to streamline user provisioning, access management, and activity monitoring throughout the user lifecycle. It offers administrators the tools to efficiently manage user privileges and ensure data security in cloud environments. With Akku, organizations can confidently embrace cloud technology while maintaining compliance with standards and regulations. Its comprehensive features enable seamless onboarding, secure authentication, a single point-of-access to all applications, enforcement of access policies, and monitoring of user activity to detect and respond to security threats effectively while enhancing the user experience significantly. By prioritizing data security, privacy, and compliance, Akku provides users with peace of mind while improving overall productivity. With its flexible and scalable architecture, Akku is well-equipped to meet the evolving needs of modern organizations in managing their identity and access requirements.

Introduction

Jira SAML SSO with Akku provides a secure and reliable method for authenticating users. To set it up, you'll need a Jira account, an Akku account, and the SAML SSO Integration feature enabled. First, configure your Akku instance by adding the Jira SAML SSO app and specifying the required fields. Then, grant Akku permission to access your Jira domain. Next, set up the SAML request URL and authentication URL in your Akku instance. Finally, test your integration to ensure seamless authentication for your users.

Configure Jira for SSO

The steps listed below provide instructions on adding the Jira application from the QuickLaunch App Store and configuring SAML SSO for the added application

1

Login into Akku

Login into Akku using the tenant url using username and password

Example Tenant URLtext
https://yourclientName.akku.work
Screenshot
Login into Akku
2

Navigate to App Management and Search for Jira

Navigate to App Management and search for Jira in the Available Apps. Click on Configure to generate the SAML metadata file.

Screenshot
Navigate to App Management and Search for Jira

Jira SSO Integration with Akku-2.0

Configure Jira Admin Console for SAML SSO

1

Log in to the Jira Admin Console

Jira admin login URL = admin.atlassian.com

Screenshot
Log in to the Jira Admin Console
2

Select the Project

After successfully logging in, select the project according to your requirements.

Screenshot
Select the Project
3

Select the Security Option

Select the Security option in the admin console.

Screenshot
Select the Security Option
4

Verify the Domain

Verify the domain according to the user's account.

Screenshot
Verify the Domain

Next, click on verify your domain name.

Screenshot
Verify Domain - Step 1
  • Enter the domain name as specified by the client.
  • Screenshot
    Verify Domain - Step 2
  • Enter the following DNS records at the client's domain name, then click the Verify Domain option in the Jira Admin console.
    Screenshot
    Verify Domain - Step 3
Once the domain is verified, we can proceed further. Below is an example of domain verification.
Screenshot
Verify Domain - Step 4
  • Look for the Identity Providers option on the Security page on the left side.
  • Click on it, then select the Other Provider option.
Screenshot
Verify Domain - Step 5
  • Enter the directory name according to the client's specifications.
Screenshot
Verify Domain - Step 6
  • Select the option: Set Up SAML Single Sign-On.
Screenshot
Verify Domain - Step 7
  • Click on Next
Screenshot
Verify Domain - Step 8

Next, we have to enter the configuration details:

Jira SAML Configurationproperties
Identity provider Entity ID
https://akkuv2.akku.work/realms/<Realm Name>

Identity provider SSO URL
https://akkuv2.akku.work/realms/<Realm Name>/protocol/saml

Public x509 certificate = which will be provided in the Akku-2.0 admin console. Copyright 2024, CloudNow LLC. 10
The certificate should be in X.509 format. For certificate formatting, you can use this link: https://www.samltool.com/format_x509cert.php
  • Before adding the details:
Screenshot
Verify Domain - Step 9
  • After adding the details:
Screenshot
Verify Domain - Step 10

It will provide two URLs that need to be added to the Akku-2.0 Admin Console:

Screenshot
Get Service Provider URLs
Example URLsproperties
Service provider entity URL
https://auth.atlassian.com/saml/0f571439-4dab-4542-be42-733685414d1a

Service provider assertion consumer service URL
https://auth.atlassian.com/login/callback?connection=saml-0f571439-4dab-4542-be42-733685414d1a

Enable SSO and Add Members

Configure authentication policies and add members

1

Enable SSO

  1. Go to admin.atlassian.com. Select your organization if you have more than one.
  2. Select Security → Authentication policies.
Screenshot
Select Security and Authentication policies
  1. Select Edit for the policy you want to enforce.
  2. Select Enforce single sign-on.
Screenshot
Enforce single sign-on
2

Add Members to Authentication Policies

Members come from your managed accounts, and add them to different policies. Enter members individually or in bulk to your authentication policy.

To enter members individually:

  1. Go to admin.atlassian.com. Select your organization if you have more than one.
  2. Select Security → Authentication policies
  3. Select Edit.
  4. Select Members tab → Add members.
  5. Enter a user name or email address (only up to 20 users).
  6. Select Add.

To enter members in bulk:

  1. Go to admin.atlassian.com. Select your organization if you have more than one.
  2. Select Security → Authentication policies
  3. Select Edit.
  4. Select Members tab → Add members.
  5. Select Bulk entry → Select Upload to add a CSV file (only up to 10,000 emails from your managed accounts are allowed).
  6. Select Add.
Screenshot
Add Members to Authentication Policies

Akku 2.0 Configurations with Jira

Configure Akku with Jira metadata

1

Login into Akku

Login into Akku using the tenant url using username and password

Example Tenant URLtext
https://yourclientName.akku.work
Screenshot
Login into Akku
2

Navigate to App Management

Navigate to App Management and search for Jira in the Available Apps. Click on Configure to generate the SAML metadata file.

  • On the left side, click the App Management option.
  • In the Apps Management section, search for the Jira app and click on it.
Screenshot
General Settings
3

Configure Application Type

For the application type, select the option: SAML.

Screenshot
Navigate to App Management
4

General Settings

General Settings Configurationproperties
Client Type: SAML

Client ID: <Service Provider Entity URL provided at the Jira Admin Console>
Here, enter the Service Provider Entity URL provided at the Jira Admin Console.
5

Login Settings

Login Settings Configurationproperties
Home URL
https://<Client Jira Address>.atlassian.net

Valid Redirect URL
https://auth.atlassian.com/*

Master SAML Processing URL
https://id.atlassian.com/logout
The Valid Redirect URL and Master SAML Processing URL are common for all Jira accounts:
• Valid Redirect URL: https://auth.atlassian.com/*
• Master SAML Processing URL: https://id.atlassian.com/logout
Screenshot
Configuration Saved
6

Advanced Settings

Advanced Settings Configurationproperties
Assertion Consumer Service POST Binding URL
<Service Provider Assertion Consumer Service URL from Jira Admin Console>

Assertion Consumer Service Redirect Binding URL
<Service Provider Assertion Consumer Service URL from Jira Admin Console>
Enter the Service Provider Assertion Consumer Service URL from the Jira Admin Console for the mentioned URLs.
Screenshot
Save Configuration
7

Save Configuration

Finally, save the changes.