Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

Table of Contents

...

Table of Contents
minLevel2
stylenone


Steps to Configure JIRA with SAML 2.0 SSO:

Procedure:

In order to configure JIRA with SAML 2.0 SSO please use the following steps:


1. Install JIRA

2. Register at OKTA and purchase a license and log into OKTA.

  • Enter your username: XXXXX
  • Enter your password: XXXXX

3. In JIRA, click on Addons

Image Modified

4. Search for SAML SingleSignOn for JIRA and install it.

  • Once installed, it will show the SAML SingleSignOn on the left hand menu.

Image Modified

Image Modified

Image Modified

5. Log into OKTA. After logging in, click on Admin on the right hand side of the page.

Image Modified

Afterwards, click on "Add Applications" and then click on "Create New App".

Image Modified

Select SAML 2.0 in the "Create New App" window and then click on create.

Image Modified

6. Fill in the Single Sign On and audience URL that we took from Jira and configure the first name, last name, and email.

Image Modified

7. Once the app is done, it will generate the metadata URL. Afterwards, copy the metadata URL and configure it in the JIRA application.

Image Modified

Image Modified

8. Click on next after clicking on the import.

Image Modified

9. Select the User creation and update options.

Image Modified

10. Before testing the application, create the same user as an SSO user in the JIRA application and assign it to the JIRA software and start the test by copying the URL in the new window.

Image Modified

11. It will now take you to the OKTA login page.

Image Modified

12. Enter the credential and test is successful.

13. Configure the additional login and logout redirection URLs.

Image Modified

14. Configure the redirection URLs so that the user can login with the SSO credentials as well as the normal JIRA credentials.

Image Modified

15. Now, the user can login with both SSO and JIRA credentials.

Steps to Integrate JIRA SSO with Zephyr OAuth:

Procedure:

In order to integrate JIRA SSO with Zephyr OAuth, please use the following steps:


1. Set the OAuth authentication in the database.

  • Go to the database → Select ITCC → Run the below command:
Code Block
titleITCC Database
insert into defect_preference values ('jira.authType', 'OAUTH', 'OAUTH' ,0,1,0,'General Configuration', 4 ,'JIRA OAuth Authentication')


...

2. Configure the application as an OAuth consumer

  • In JIRA, OAuth consumers are represented by application links.
  • Application links use OAuth with RSA-SHA1 signing for authentication.
  • This means that a private key is used to sign requests rather than the OAuth token secret/consumer secret.
  • In the following steps, you’ll be generating an RSA public/private key pair, then creating a new application link in JIRA that uses the key.

Generate an RSA public/private key pair:

  • In your terminal, run the following openssl commands


Code Block
openssl genrsa -out jira_privatekey.pem 1024
openssl req -newkey rsa:1024 -x509 -key jira_privatekey.pem -out jira_publickey.cer -days 365
openssl pkcs8 -topk8 -nocrypt -in jira_privatekey.pem -out jira_privatekey.pcks8
openssl x509 -pubkey -noout -in jira_publickey.cer  > jira_publickey.pem

...