Customers have installed this add-on in at least 215 active instances.
    by Bitium, Incfor JIRA Server 6.0 - 7.3.3
    This add-on isn't formally supported, but you can ask a question via Atlassian Answers.

    Ask a question

    Bitium, Inc supports this add-on.

    Get support

    Get it nowFree add-on

    Easily configure JIRA to support SAML 2.0

    Easily configure JIRA to support SAML 2.0

    Quick Setup

    Simple UI for End Users


    Easily configure Confluence to work with your Identity Provider

    Once the plugin is configured, the end user experience is easy to understand.

    The plugin can be configured to either force Single-Sign-On through your IdP or to allow the user to choose SAML or username/password.

    More details

    We hope you enjoy using the SAML 2.0 Single Sign-On for JIRA plugin. If you run into any issues, please use the Github issue tracker or look through the wiki for additional information on configuring the plugin - links for both can be found under the "support" tab.

    User reviews

    Sign in to write a review
    by May Srichainont on 2016-06-15
    This question is to Tobias, may I ask how you able to work thru the issue you mentioned where you've enable 'Force SSO' and afterward you cannot access the admin realm anymore and end up in a redirection loop to the standard page. How are you able to workaround this? Thank you.
    Was this review helpful?YesNo
    by Tobias Spöcker on 2016-04-20
    Be very careful with "force SSO"!! We tested evrything and it seemed to work. So we enabled that feature... BUT then you cannot access the admin realm anymore! You always end up in a redirection loop to the standard page. This bug was already reported several times and no reaction seen so far. The rest works as expected. But the setup is for nox experienced people a bit difficult.
    Was this review helpful?YesNo
    by Jouko Markkanen on 2016-03-08
    Works fine, but I agree on weaton's comment on the lacking documentation. We use this together with Microsoft AD FS as identity provider. Had to set up using some random values as Entry ID in the plugin and the identifier to configure in AD FS, then try to log in and read the correct values from the logs in both ends. To help other users, the values would be "https://jira.example.com:443/jiraSAML" for the identifier configured in AD FS, and "http://adfs.example.com/adfs/services/trust" as Entity ID in the plugin config form, login URL would be "https://adfs.example.com/adfs/ls", and in the certificate field copy/paste the Token signing certificate (base64 encoded) from the AD FS server. Finally, configure a claim rule in AD FS to map SAM-Account-Name into the Name ID field of the outgoing claim, if you use LDAP/AD synchronization in Jira. One mysterious thing is that the "Use Corporate Login" button that is shown in the Jira login page is not always visible on the login form of the default Jira dashboard. Haven't figured out yet why, and why it occasionally appears there.
    1 out of 1 found this review helpful
    Was this review helpful?YesNo
    by Robert Heckel on 2016-02-04
    No longer is able to create a user in 7.0.10 due to the use of deprecated class: com.atlassian.jira.user.util.UserUtil.createUserNoNotification Setup was pretty straight forward. Functioned better than similar paid versions tested, until the above occurred.
    Was this review helpful?YesNo
    by weaton on 2016-01-19
    Let me start by saying that we have been using this plugin for about 30 days. so far it is great! have not had any issues Pros: Free easy to use Cons: Setup had no explanation, had to download a trial of a paid version by someone else to get their setup instructions and convert them to this plugin for setup.
    2 out of 2 found this review helpful
    Was this review helpful?YesNo


    Bitium, Inc provides support for this add-on.

    Vendor support resources


    Find out how this add-on works.


    Community discussions connect you to the vendor and other customers who use this add-on.

    Atlassian Community

    Atlassian-hosted discussions connect you to other customers who use this add-on.


    Version 1.0.3 JIRA Server 6.0 - 7.3.3 Released 2016-02-26


    Maintenance and bug fixes


    - Refactored the logic for creating a session for SSO user

    - Fixed auto-create user option on JIRA 7+

    - Removed usage of deprecated UserUtil class

    - Fixed missing "Use Corporate Login" button on JIRA 7+

    - Auto-created users are now added to a specific user group. The group used can be configured in the plugin config.

    - Refactored SAMLConfig, SsoLoginServlet and SsoLogoutServlet logic into the common [atlassian-saml](https://github.com/bitium/atlassian-saml) project

    - Plugin now redirects to the correct requested page after SSO. No longer defaulting to the dashboard.


    1. Log into your JIRA instance as an admin.
    2. Click the admin dropdown and choose Add-ons. The Manage add-ons screen loads.
    3. Click Find new add-ons from the left-hand side of the page.
    4. Locate SAML 2.0 Single Sign-On for JIRA via search. Results include add-on versions compatible with your JIRA instance.
    5. Click Install to download and install your add-on.
    6. You're all set! Click Close in the Installed and ready to go dialog.

    To find older SAML 2.0 Single Sign-On for JIRA versions compatible with your instance, you can look through our version history page.

    Similar add-ons