Confluence - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Confluence using OIDC.Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Generic OIDC.
- On the Basic Information page, enter the name for the Service Provider in the Name field.
- Click Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired log in method as either Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Under Connection Profile, provide the following details:
- Authorization Server Issuer URL will be auto populated. This URL is used in the miniOrange configuration to form Authorize Endpoint URL, Token Endpoint URL and User Info Endpoint URL.
- Redirect URL will be Oauth Callback URL obtained from the miniOrange configuration.
- Provide a Client ID.
- Select Client Authentication Method as 'CLIENT_SECRET_BASIC'.
- Provide a Client Secret or generate one by clicking Generate button.
- Provide the scope as 'openid', 'profile', and 'email'.
Refer to the Notes section to add the scope.
- Click Save and Finish.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Notes
To add scopes:- Navigate to Access > OIDC Settings > Scopes.
- After adding all the desired scopes, click Save Settings.
Configure miniOrange Identity Broker
miniOrange as an Identity Provider
Perform these steps to configure miniOrange as an Identity Provider:
Procedure
- Log in to miniOrange admin console: https://login.xecurify.com/moas/login.
- Go to Apps and click + Add Application.
- In Choose Application Type, click Create App under the SAML/WS-FED application type.
- Search for and select Atlassian Cloud (SAML) in the list. If it's not available, search for Custom and set up your application through Custom SAML App.
- Enter the following values in the respective fields (you will receive these values after completing the Atlassian Cloud configuration).
- Custom Application Name: Provide any name.
- SP Entity ID or Issuer: You will receive this after configuring Atlassian Access App.
- Audience URI: Use the same value as SP Entity ID.
- ACS URL: You will receive this after configuring Atlassian Access App.
- Ensure that Sign Response and Sign Assertion are both enabled.
- Select the following values in the corresponding fields:
- Name ID: Select E-Mail Address.
- NameID Format: Select 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified'.
- Click Save.
- Once the app is successfully created, select that app and then click Metadata to obtain the app’s metadata.
- Since miniOrange is being used as a brokering service, go to Information required to authenticate via external IDPs section, and click Show Metadata Details.
- After clicking Show Metadata Details, you will see the metadata details. You will need these details while configuring Atlassian Access App.
miniOrange as a Service Provider
Perform these steps to configure miniOrange as a Service Provider:Procedure
- Log in to miniOrange admin console: https://login.xecurify.com/moas/login.
- From the left navigation bar, select Identity Providers, then click Add Identity Provider.
- Select the OAuth 2.0 tab.
- Enter the following values:
- IDP Name: Select Custom Provider.
- IDP Display Name: Choose any name.
- OAuth Callback URL: The callback URL obtained here is used in the RSA Cloud Authentication Service configuration.
- OAuth Authorize Endpoint: Use the Authorization Server Issuer URL obtained from the RSA Cloud Authentication Service + '/auth'.
- OAuth Access Token Endpoint: Use the Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + '/token'.
- OAuth Get User Info Endpoint: Use the Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + '/userinfo'.
- Client ID: Provide the client ID used in the RSA Cloud Authentication Service configuration.
- Client Secret: Provide the client secret used in the RSA Cloud Authentication Service configuration.
- Grant Type: Select Authorization Code Grant.
- Ensure that Send client credentials in Header and Send Scope in Token Request both are both enabled.
- Provide the Scope as openid profile email.
- Click Save.
Configure Atlassian Cloud
Perform these steps to configure Atlassian Cloud:
- Log in to Atlassian Cloud admin console: https://admin.atlassian.com/
- Select your organization.
- Navigate to the Security tab, select Identity providers from the left sidebar, and then click Choose on the Other provider section.
- Enter any name in the Directory name field, then click Add.
- Select Set up SAML single sign-on.
- You will be redirected to the Add SAML details window. You can get these details from the metadata details section after configuring the miniOrange app:
- Identity provider Entity ID: This is the Identity provider Entity ID or Issuer obtained from the miniOrange Metadata.
- Identity provider SSO URL: This is the SAML Login URL obtained from the miniOrange Metadata.
- Public x509 certificate: Use the X.509 certificate obtained from the miniOrange Metadata.
- Click Next.
- Copy the displayed Service provider entity URL and Service provider assertion consumer service URL. You will need these details for configuring the miniOrange app.
- To enable Single Sign-On (SSO) for managing user accounts, enter the desired domain name to link it with your identity provider. Click Next, then Save.
- Set up the authentication policies by selecting Authentication policies from the left sidebar, then click Add policy.
- Select a directory for your policy and enter the policy name.
- Under Single sign-on, check the Enforce single sign-on checkbox.
- Click the Members tab and click Add members.
- Enter details and click Add Members. Single Sign On (SSO) will apply only to the added members.
- When a user tries to log in to the Atlassian Cloud app, they will be redirected to RSA for authentication through the miniOrange broker.
The configuration is complete.
Return to Confluence - RSA Ready Implementation Guide
Related Articles
Add an OIDC Application 72Number of Views Delete an Application from the Applications List 15Number of Views Add a SAML Version 2 SSO Agent Identity Provider 17Number of Views Add a Service Provider 55Number of Views SAML Applications 24Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?