Log in to Atlassian Cloud using OAuth/OIDC Provider
Atlassian Cloud has become very popular over the years. It offers cut-throat pricing, particularly for SMB’s. Since the declaration of Server discontinuation by Atlassian, an ever-increasing number of clients are moving to Cloud and Data Center. You can look at our article to check whether Atlassian Cloud is a decent choice for you here- Atlassian’s Server License Discontinuation: What are your choices?
What is Atlassian Access?
Atlassian Access is an enterprise-grade subscription for enhanced security that provides centralized administration and governance. Atlassian Access SSO has security controls like SAML Single Sign On (SSO), User Lifecycle Management, Active Directory Sync, and many more.
Single Sign-On into Atlassian Access allows users to authenticate to Atlassian Cloud products through your existing SAML 2.0 Identity Provider giving you the ability to enable and use Atlassian Cloud Jira SSO and Atlassian Cloud Confluence SSO. Cloud SAML Single Sign On (SSO) provides employees with a simple and easy process for accessing the tools that they use and allows admins to enforce identity-related security controls at scale, making the task of securing large groups of users far simpler.
What if users are present in OAuth or OpenID Provider? Will SSO still work? How can we connect Atlassian Cloud (SAML SSO modules) to OAuth/OIDC Providers? Is it even possible?
Yes! You can do all of this and more with miniOrange’s Identity Brokering Service!
What is miniOrange Identity Brokering Service?
Identity brokering is a way to establish trust between any two applications that do not speak the same language. Identity Brokering is a service that connects multiple service providers with different Identity Providers. Atlassian Access only allows SAML requests & responses. If your organization uses OAuth/OIDC protocol and would like to use Atlassian Access for Single Sign-On, you’re in somewhat of a fix! This is where miniOrange Identity Brokering comes into play.
It establishes trust between any two applications like Atlassian Access SSO (SAML) and any OAuth/OIDC Provider that does not speak the same protocol and helps them understand requests and responses. This will be equivalent to a language translator where translators understand one language and translate it into another language. While using a translator, one needs to know at least one of the languages, whereas while using our product — you do not need to worry about any of the protocols.
Users will still see the same flow which they see with other apps. On accessing Atlassian, they will see the OAuth Provider’s login page, they will not see any miniOrange page or login screen in between, so users will not notice the integration with miniOrange.
You can use both Cloud Jira SSO and Cloud Confluence SSO through one centralized miniOrange offering. Applications that do not communicate with each other using the same protocol are known as cross-protocol applications.
Over the years we have developed many standards for doing this like SAML, OpenID, OAuth, OpenID Connect, but the problem is that very few people can get these protocols talking to each other safely and quickly. miniOrange’s Identity Brokering, built-in to our proprietary Identity Provider product has one feature all good products have — you don’t need to worry about the underlying technology, protocols, tokens.
Our Identity broker service hides all the complexity of these protocols and provides a simple HTTPS endpoint for parties to use. Without implementing SAML, OpenID, OAuth, or OpenID Connect, you can suddenly start speaking these languages and have access to identity and access tokens from hundreds of providers. The only thing you will need to know is how to call an HTTPS endpoint which is much simpler than understanding different standards. This is similar to users’ experience for Atlassian Access SSO when connecting to a SAML Identity Provider.
On the miniOrange side, you must configure
- Atlassian Access SAML SSO Application as a Service Provider and miniOrange as an Identity Provider
- OAuth or OIDC Provider as an Identity Source in miniOrange where miniOrange is the OAuth Client to enable OAuth SSO or OIDC SSO for easy login.
Once the connection is successful, you are good to go. You can refer to this document for end-to-end setup.
Using miniOrange Identity Broker Service, you can also connect multiple Providers or add user directories. You can enhance Atlassian Cloud security by enabling Secure login with Two Factor Authentication (2FA) or Multi-Factor Authentication (MFA) in miniOrange.
What do you think about this solution? Do you think this would be helpful for Cloud users trying to authenticate from an external OAuth Provider? Please drop us a mail at firstname.lastname@example.org or raise a ticket here to talk to us.
You can learn more about our Identity Brokering features here -
You can take a tech deep dive into the solution here -