• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

Rublon 2FA SSO for Jira, Confluence

Enable Single Sign On in Jira and Confluence

October 8, 2020 By Rublon Authors

Last updated on April 23, 2024

Overview

This document describes how to enable Single Sign On in Jira / Confluence / Bitbucket Server using the SAML Single Sign On plugin, Rublon Access Gateway and Microsoft Active Directory. After completing the Configuration section of this document, you should be able to log in to one Atlassian product using Rublon 2FA, and then switch to another Atlassian product without going through the authentication process again.

Before you start

It is assumed you have configured Rublon Access Gateway and enabled Rublon 2FA for your Atlassian products (Jira, Confluence).

Configuration

This document describes the configuration of Single Sign On in Jira. The user logs in to Jira using Rublon 2FA, and then switches to Confluence without going through the authentication process again. Configuration steps for Confluence and Bitbucket Server are the same.

Synchronize Users

1. Click the cog icon in the top right corner. Select User management.

2. Select User Directories on the left-hand side.

3. Click Add Directory. Choose Microsoft Active Directory. Click Next.

4. Configure your LDAP User Directory (Microsoft Active Directory). Refer to the following image and table to learn more about the fields you have to fill in.

NameSpecify the name of your directory, e.g. My Active Directory
Directory TypeSelect Microsoft Active Directory.
HostnameEnter the hostname or IP address of your Active Directory server.
PortEnter the port of your Active Directory server.
UsernameEnter the username of the user to log in to Active Directory.
PasswordEnter the password corresponding to the username entered above.
Base DNEnter the root node from which to search for users and groups, e.g. cn=users,dc=example,dc=com

5. Click Save and Test to save your configuration. Your connection will be tested. We recommend providing the credentials of a user in your directory for extended testing.

6. After a successful test, click Back to directory list. You should see your Active Directory server listed under User Directories.

7. Click Synchronize to synchronize your users.

8. Click Users on the left panel and ensure the list displays your users from Microsoft Active Directory.

9. This concludes the user synchronization part of the configuration. You have to install and configure SAML Single Sign On now.

Configure SAML Single Sign On

Installing the SAML Single Sign On for Jira plugin (or another plugin for Single Sign On) allows you to connect to an external identity provider (Rublon Access Gateway in our case). This is a required and next step after synchronizing your users.

1. Click the cog icon in the top right corner. Select Manage apps.

2. Search the SAML Single Sign On for Jira plugin in Jira Marketplace and install it. 

3. After a successful installation of the plugin, you will see a new SAML Single Sign On option in the menu on the left side.

4. Click SAML Single Sign On. You will see a Welcome window. Click Add new IdP.

5. Select Other SAML Identity Provider in the IdP Type dropdown, and then enter the name and description of your IdP. Click Next.

6. Save the XML file from Metadata URL. You are going to need it later. Click Next.

7. Do not close Jira. Open Rublon Access Gateway in a new tab.

8. Go to Applications → Import application metadata.

9. Enter the Application name and select the metadata file you just downloaded from Jira. Click UPLOAD to add the new application.

10. Download XML metadata. You are going to need this file later.

11. Get back to Jira. Import the metadata XML file you downloaded from Rublon Access Gateway. Select I have a metadata XML file. Select your file. Click Import. Click Next.

12. Select EMAIL as the Authentication Attribute. Click Next.

13. The SAML Single Sign On for Jira plugin allows adding new users to Jira, but you do not need this option in your configuration, because you synchronize users with Microsoft Active Directory instead. Select Update from SAML-Attributes and click Save & Next.

14. Click Start test.

15. Plugin generates a login link. Open the link and log in using the credentials from Microsoft Active Directory. Jira server login will redirect you to Rublon Access Gateway, which is connected with Microsoft Active Directory. Go through the authentication process. Do not forget to check Remember this device during the second factor.

16. You will be logged in to your Jira Server. Status will change to SUCCESS. Click Next.

17. The last window asks about redirect options. Select Enable SSO Redirect, so that the standard Jira login will be redirected to the Single Sign On login. Ensure that Single Sign On works correctly before doing this! Click Save & Close.

18. When Single Sign On is configured correctly in all applications (Jira / Confluence / Bitbucket Server), users can log in only to one application and then switch to another without logging in again when remembering trusted devices. Configuring SSO URL links is the last part of the configuration process.

Configure SSO URL Links

Atlassian products allow you to quickly switch to another Atlassian application by adding URL links in Application Navigator. Adding links using SSO mechanisms allows you to switch between applications without having to log in again. This section portrays the configuration in Jira. Application Navigator works similarly in Confluence Server and Bitbucket Server.

1. Click the cog icon in the top right corner. Select Applications.

Note

In Confluence you have to select General Configuration instead.

2. Click Application Navigator on the left.

3. Add application URLs for Bitbucket and Confluence.

4. Refresh the page. Click the tiles icon in the top left corner. You should see a list of applications you can switch to.

5. After clicking an application name, you will be logged in to the application without having to go through the authentication process again.

Troubleshooting

If you encounter any issues with your Rublon integration, please contact Rublon Support.

Filed Under: Documentation Tagged With: atlassian, confluence, jira, single sign-on, sso

Primary Sidebar

Contents

  • Overview
  • Before you start
  • Configuration
    • Synchronize Users
    • Configure SAML Single Sign On
    • Configure SSO URL Links
  • Troubleshooting
Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English