1. Create a SAML Service Provider
![DualShield MFA Platform > DualShield Configuration [JIRA] > image-2024-11-28_17-37-18.png](/download/attachments/35947765/image-2024-11-28_17-37-18.png?version=1&modificationDate=1732815438446&api=v2)
Use the Screenshot above, which shows the configuration.
SSO Server: Select "Single Sign-on Server"
Application: Choose the Jira Application created previously.
Name: Enter an appropriate Name for this Service Provider.
Type: Choose "SAML 2.0"
Click the "CREATE METADATA" button. Then use the following Metadata template. Paste it in to the box. Then "SAVE":
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
entityID="https://jira.acme.com/jiraSAML">
<SPSSODescriptor
AuthnRequestsSigned="false"
WantAssertionsSigned="true"
protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<SingleLogoutService
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://jira.acme.com/plugins/servlet/saml/auth" />
<AssertionConsumerService
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://jira.acme.com/plugins/servlet/saml/auth" />
<AttributeConsumingService index="0" isDefault="true">
<RequestedAttribute Name="loginName" NameFormat="urn:string" FriendlyName="Login Name" isRequired="true" />
<RequestedAttribute Name="fullName" NameFormat="urn:string" FriendlyName="Full Name" isRequired="false" />
</AttributeConsumingService>
</SPSSODescriptor>
</EntityDescriptor>
|
Replace "jira.acme.com" with the domain name of your JIRA server.
The "Location" of "AssertionConsumerService" should be the same as the SAML Endpoint in the configuration of SAML add-on.
![DualShield MFA Platform > DualShield Configuration [JIRA] > image2017-5-5 23:7:35.png](/download/attachments/35947765/image2017-5-5%2023%3A7%3A35.png?version=1&modificationDate=1587386301000&api=v2)
![DualShield MFA Platform > DualShield Configuration [JIRA] > image-2024-11-28_17-46-19.png](/download/attachments/35947765/image-2024-11-28_17-46-19.png?version=1&modificationDate=1732815979126&api=v2)
Click the context "..." menu on the new Logon Procedure, then select "Logon Steps".
On the right, click the "+ ADD" button to add a new authentication method. Repeat for each Step.
For example, for this Web SSO Application, this could be "Static Password" (AD Password) and "One-Time Password":
Navigate to "Authentication | Applications"
Click the "+ CREATE" button
Enter an appropriate "Name" for this new Application
Select the internal "Realm"
Select the Logon Procedure created previously.
![DualShield MFA Platform > DualShield Configuration [JIRA] > image-2024-11-28_17-54-26.png](/download/attachments/35947765/image-2024-11-28_17-54-26.png?version=1&modificationDate=1732816466826&api=v2)
Click the context "..." menu of the new Jira application, then select "Agents"
From the Agents List, select "Single Sign-on Server". Then "SAVE" button:
![DualShield MFA Platform > DualShield Configuration [JIRA] > image-2024-11-28_17-56-24.png](/download/attachments/35947765/image-2024-11-28_17-56-24.png?version=1&modificationDate=1732816584303&api=v2)
Finally, select the context "..." menu, then "Self Test", to confirm the Application is fully provisioned:
![DualShield MFA Platform > DualShield Configuration [JIRA] > image-2024-11-28_17-58-57.png](/download/attachments/35947765/image-2024-11-28_17-58-57.png?version=1&modificationDate=1732816736970&api=v2)