Suggested Claim Mapping between Azure AD and Jira


Platform Notice: Data Center - This article applies to Atlassian products on the Data Center platform.

Note that this knowledge base article was created for the Data Center version of the product. Data Center knowledge base articles for non-Data Center-specific features may also work for Server versions of the product, however they have not been tested. Support for Server* products ended on February 15th 2024. If you are running a Server product, you can visit the Atlassian Server end of support announcement to review your migration options.

*Except Fisheye and Crucible

Summary

These are only a recommendation based on what we most commonly see and you should work with your Azure Administrator to ensure that everything is aligned with your Organizational Policies and Requirements.

Integrating Jira with Azure AD for Single-Sign-On is usually a straight-forward process, however, the claim mapping between systems can sometimes be tricky.  The content below should help you setup a SAML integration with the correct claims being released from Azure AD and mapped in Jira.

You should follow these suggestions if you use the SSO for Atlassian DC app and:

  • You are setting up Single-Sign-On in Jira for the first time using Azure AD as your IDP
  • You already have Single-Sign-On setup with Azure AD and you see login errors when trying to access Jira
  • You would like to enable JIT User Provisioning in Jira and need to reference the right claims to release and map in Jira.

Environment

9.0.0 → 9.15.0+

Claims in Azure AD

In Azure AD, we recommend releasing the following claims:

Claim in Azure ADCommon URL
Name IDhttp://schemas.microsoft.com/ws/2005/05/identity/claims/name
Given Name

http://schemas.microsoft.com/ws/2005/05/identity/claims/givenname

Surnamehttp://schemas.microsoft.com/ws/2005/05/identity/claims/surname
Emailhttp://schemas.microsoft.com/ws/2005/05/identity/claims/email
Groupshttp://schemas.microsoft.com/ws/2008/06/identity/claims/groups


(info) In Azure, it generally looks like this:

Mapping the Claims in Jira

In Jira, you will navigate to Settings > System > Authentication Methods then select to create a new SAML integration, or edit your existing SAML integration with Azure AD

Then, under the field: Username Mapping, you will want to ensure that it's mapped to Name ID. In most cases, it should look like this:


(info) If you plan to enable JIT provisioning, then click on the checkbox "Create users on login to the application" and add the claims above to the rest of the values listed

  • Display name should be a combination of givenname and surname:

    ${http://schemas.microsoft.com/ws/2005/05/identity/claims/givenname} ${http://schemas.microsoft.com/ws/2005/05/identity/claims/surname}
  • Email should be mapped to the email claim:

    ${http://schemas.microsoft.com/ws/2005/05/identity/claims/email}
  • And groups should be mapped to groups, and you should not use the attribute mapping parameters

    http://schemas.microsoft.com/ws/2008/06/identity/claims/groups


Testing:

At this point, you are ready to test the authentication flow as both an existing, and new, user. Its recommended that you use a SAML tracer app and enable additional logging in Jira (see: Troubleshooting SAML authentication failures with additional debug logging) to help debug any additional login issue, or adjust the claims based on the data contained within the SAML assertion.



Last modified on Apr 5, 2024

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.