Confluence - My Page SSO Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO (OIDC).Procedure
- Sign into RSA Cloud Administration Console.
- Navigate to Applications > Applications Catalog and click Create From Template.
- Click Choose Connector Template page, click Select from OIDC.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- Choose your desired Access Policy for this application and click Next Step.
- Under Connection Profile, provide the following details:
- Specify the Connection URL as follows: https://<organization-name>.atlassian.net/wiki
Note: The <organization-name> is set up during the initial setup or registration process of Atlassian Confluence Cloud. It can typically be managed and updated through the administration settings by authorized administrators.
- Authorization Server Issuer URL will be auto populated. This URL is used on the miniOrange configuration to form Authorize Endpoint URL, Token Endpoint URL and User info Endpoint URL.
- Redirect URL will be Oauth Callback URL obtained from the miniOrange configuration.
- Provide a Client ID.
- Select Client Authentication Method as 'CLIENT_SECRET_BASIC'.
- Provide a Client Secret or generate one by clicking Generate button.
- Provide the scope as 'openid', 'profile', and 'email'.
Refer to the Notes section to add the scope.
- Click Next Step.
- On Portal Display page, configure the portal display and other settings.
- Click Save and Finish.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Notes
To add scopes:- Navigate to Access > OIDC Settings > Scopes.
- After adding all the desired scopes, click Save Settings.
Configure miniOrange Identity Broker
miniOrange as an Identity Provider
Perform these steps to configure miniOrange as an Identity Provider:
Procedure- Log in to miniOrange admin console: https://login.xecurify.com/moas/login.
- Go to Apps and click + Add Application.
- In Choose Application Type, click Create App under the SAML/WS-FED application type.
- Search for and select Atlassian Cloud (SAML) in the list. If it's not available, search for Custom and set up your application through Custom SAML App.
- Enter the following values in the respective fields (you will receive these values after completing the Atlassian Cloud configuration).
- Custom Application Name: Provide any name.
- SP Entity ID or Issuer: You will receive this after configuring Atlassian Access App.
- Audience URI: Use the same value as SP Entity ID.
- ACS URL: You will receive this after configuring Atlassian Access App.
- Ensure that Sign Response and Sign Assertion are both enabled.
- Select the following values in the corresponding fields:
- Name ID: Select E-Mail Address.
- NameID Format: Select 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified'.
- Click Save.
- Once the app is successfully created, select that app and then click Metadata to obtain the app’s metadata.
- Since miniOrange is being used as a brokering service, go to Information required to authenticate via external IDPs section, and click Show Metadata Details.
- After clicking Show Metadata Details, you will see the metadata details. You will need these details while configuring Atlassian Access App.
miniOrange as a Service Provider
Perform these steps to configure miniOrange as a Service Provider:
Procedure
- Log in to miniOrange admin console: https://login.xecurify.com/moas/login.
- From the left navigation bar, select Identity Providers, then click Add Identity Provider.
- Select the OAuth 2.0 tab.
- Enter the following values:
- IDP Name: Select Custom Provider.
- IDP Display Name: Choose any name.
- OAuth Callback URL: The callback URL obtained here is used in the RSA Cloud Authentication Service configuration.
- OAuth Authorize Endpoint: Use the Authorization Server Issuer URL obtained from the RSA Cloud Authentication Service + '/auth'.
- OAuth Access Token Endpoint: Use the Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + '/token'.
- OAuth Get User Info Endpoint: Use the Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + '/userinfo'.
- Client ID: Provide the client ID used in the RSA Cloud Authentication Service configuration.
- Client Secret: Provide the client secret used in the RSA Cloud Authentication Service configuration.
- Grant Type: Select Authorization Code Grant.
- Ensure that Send client credentials in Header and Send Scope in Token Request both are both enabled.
- Provide the Scope as openid profile email.
- Click Save.
Configure Atlassian Cloud
Perform these steps to configure Atlassian Cloud:
- Log in to Atlassian Cloud admin console: https://admin.atlassian.com/
- Select your organization.
- Navigate to the Security tab, select Identity providers from the left sidebar, and then click Choose on the Other provider section.
- Enter any name in the Directory name field, then click Add.
- Select Set up SAML single sign-on.
- You will be redirected to the Add SAML details window. You can get these details from the metadata details section after configuring the miniOrange app:
- Identity provider Entity ID: This is the Identity provider Entity ID or Issuer obtained from the miniOrange Metadata.
- Identity provider SSO URL: This is the SAML Login URL obtained from the miniOrange Metadata.
- Public x509 certificate: Use the X.509 certificate obtained from the miniOrange Metadata.
- Click Next.
- Copy the displayed Service provider entity URL and Service provider assertion consumer service URL. You will need these details for configuring the miniOrange app.
- To enable Single Sign-On (SSO) for managing user accounts, enter the desired domain name to link it with your identity provider. Click Next, then Save.
- Set up the authentication policies by selecting Authentication policies from the left sidebar, then click Add policy.
- Select a directory for your policy and enter the policy name.
- Under Single sign-on, check the Enforce single sign-on checkbox.
- Click the Members tab and click Add members.
- Enter details and click Add Members. Single Sign On (SSO) will apply only to the added members.
- When a user tries to log in to the Atlassian Cloud app, they will be redirected to RSA for authentication through the miniOrange broker.
The configuration is complete.
Return to Confluence - RSA Ready Implementation Guide
Related Articles
How to define email recipients of emails defined in RSA Identity Governance & Lifecycle email templates 60Number of Views View a Risk-Based Authentication Policy 3Number of Views Offline Authentication 147Number of Views Email Notifications are not using Default Email Account in RSA Identity Governance and Lifecycle 6.x and 7.0 64Number of Views Customize E-mail Notifications 61Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?