http://portal.azure.com.
Select the Directory + Subscription icon in the portal toolbar, and make sure you have selected the directory that contains your Azure AD B2C tenant.
In the Azure portal, search for and select Azure AD B2C.
Navigate to the Azure Active Directory page, then select Enterprise applications under Manage in the left panel.
Select New Application to add a new enterprise application.
We created presets in the gallery for the SAML SSO app. Search for "resolution gmbh" and choose the version which matches your Atlassian product, e.g. "SAML SSO for Jira by resolution GmbH" for Jira.
Click Add to add a new enterprise application. You can also choose a new name for it.
Please wait until the Azure portal redirects you to the enterprise application you just created. This can take a couple of seconds. For the next steps, you will configure the enterprise application.
In the left panel, click Properties. In the new window, scroll down to User assignment required? and set the option to NO. Afterward, Save your configuration.
In the left panel under Manage, choose "Single sign-on". Then click SAML for the Single Sign On method.
Click the pen symbol in Basic SAML Configuration.
Set the Identifier (Entity ID) and the Reply URL (Assertion Consumer Service URL). You can find both in the last window of the wizard.
In general, the needed URL for both is: https://<base-url>/plugins/servlet/samlsso
You need to substitute <base-url> with the base URL of your Atlassian product instance. The gallery application already provides the needed URLs. You only have to substitute YOURJIRASERVERNAME with the URL of your Atlassian product instance and then click Save.
Scroll down to SAML Signing Certificate and copy the App Federation Metadata Url. The link will be used to configure the SAML SSO app.
The configuration in Azure AD B2C is now finished. In the next step, we will finish the configuration in the SAML SSO wizard.
Paste the App Federation Metadata Url that was obtained before in the "Metadata URL" textfield.
Click on "Import".
Click on "Next" to continue.
For User update, choose Update from SAML-Attributes.
The window now expands. There are various options you can set. For this tutorial, new users should be created automatically when first accessing your Atlassian product instance, thus tick "Create New Users".
You can also choose the directory for new users or to update non-SAML provisioned users, i.e. which are already present in your Atlassian product. By activating the option, they can also be updated via SAML attributes when they log in.
Further, the "Full Name Attribute" and "Email Attribute" must be set.
Set the Full Name Attribute to http://schemas.microsoft.com/identity/claims/displayname
and the Email Attribute to http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Scroll down to the group settings.
Depending on your Atlassian product, it is a good idea to set (default) user group(s) for new users, such as jira-servicedesk-users for Jira SD, confluence-users for Confluence or stash-users for Bitbucket. Without assigning new users to the product specific group, they are not able to use your Atlassian product. Also, feel free to activate any option which suits your needs.
Click on Save & Next.
The wizard also allows testing the Single Sign On. Just follow the steps to test if the login works as expected.
Click on "Start test" to proceed.
Copy the blue marked link and open a new incognito/private tab or a different web browser. Then, paste the link and navigate to it.
You will be now redirected to Azure AD's login page. Please log-in with your username and password.
If everything worked fine, you will be logged in to your Atlassian product. In the other tab/browser in which you were configuring the SAML SSO plugin, you can see also the "SUCCESS" status, if everything worked as expected.
Click Next to proceed.
As a last step, you can set the Enable SSO Redirect option. If set, all users will be redirected to Single Sign On, thus they will be logged in via the IdP.
Click on Save & Close to finish the configuration.