SaaS Application Configuration Guide : Atlassian Jira Enterprise

BIG-IP as SAML IdP Configuration

This document describes the configuration for a SAML Identity Provider for SaaS Application workflow using a SaaS Application template. Follow the steps below to configure Atlassian Jira Enterprise:

  1. Logon to the BIG-IP user interface and click Access -> Guided Configuration
  2. Select the Federation category.
  3. Select SAML Identity Provider for SaaS Application to configure BIG-IP as a SAML Identity Provider.
  4. Review the Required Configuration information, and complete the following required step before you configure the SaaS Application.
  • Provide the Identity Provider details.
  • Provide the Virtual Server configuration details.
  • Configure the Authentication method to use for the SAML Identity Provider.
  • After you confgure the SaaS Application Configuration, configure (optional) Endpoint Checks and Customization settings.

Atlassian Jira Enterprise Configuration in Guided Configuration Workflow

The SaaS Application screen displays a list of applications from which you can select to configure SAML Service Provider applications. Select a specific application and click Add.

For example, to configure Atlassian Jira Enterprise, select Atlassian Jira Enterprise and click Add.

Common Application Properties

  1. Specify the application name. The system uses the name internally, to identify configuration details for the application and the SAML service provider for it.
  2. Select whether the application supports IDP Initiated requests. Select the IdP Initiated option to display the application resource on the Webtop.
  3. Specify or modify the caption. The Webtop uses the caption to display the application resource.
  4. Specify an optional description for the application.

Application Specific Properties

To configure Atlassian Jira Enterprise provide following inputs:
  • Assertion Consumer Service URL : Provide the Assertion Consumer Service URL
  • Entity ID : Provide the entity ID.

Additional SAML Attributes and ACS Properties

  1. Configure any additional attribute values to include in the SAML assertion to SaaS Application. Each SAML Attribute has an attribute name and attribute value. The session variable values can specify attribute values. Configure an AD or LDAP query to include specific attributes in session variables.
  2. Configure an additional Assertion Consumer Service URI if the application requires such a URI.

Security Properties

  1. Specify whether to sign the assertion and response, and specify the signing algorithm.
  2. Specify whether to require a signed Authentication Request. If required, select a signing certificate.
  3. Specify whether to encrypt assertions. If required, speciofy the encryption algorithm and select the encryption certificate.
  4. Complete the workflow configuration by configuring optional endpoint checks and customization.

Deploy the Configuration

  1. Deploy the configuration from the Summary screen.
  2. To retrieve the metadata for this configuration, navigate to Access -> Federation -> Saml Identity Provider -> Local Idp Services.
  3. Select the SAML SSO object created for for Atlassian Jira Enterprise, and click Export Metadata.
  4. Use the exported IdP SAML Metadata to configure the IdP Provider configuration in the Atlassian Jira Enterprise service.

Setup Atlassian Jira Enterprise as SAML Service Provider

Refer to Atlassian Jira Enterprise documentation to set it up as SAML Service Provider.

Test the Configuration

  1. To test the configuration, click on the link Click to test configuration on the Summary page.
  2. A succesful logon should display a Webtop that includes the IdP Initiated Applications.