Announcements

SecurID® Integrations

Atlassian Statuspage - SAML Relying Party Configuration - RSA Ready SecurID Access Implementation Guide

This section describes how to integrate RSA SecurID Access with Atlassian Statuspage using Relying Party. Relying party uses SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to Atlassian Statuspage SAML Service Provider (SP).

Architecture Diagram

jaink9_0-1644273650491.png

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to Atlassian Statuspage .

Procedure

1. Sign into the RSA Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.

jaink9_1-1644273688053.png

2. From the Relying Party Catalog, select the +Add button for Service Provider SAML.

jaink9_2-1644273747754.png

3. In the Basic Information section, enter a name and click Next Step.

jaink9_3-1644273796582.png

4. In the Authentication section, do the following:

a. Under Authentication Details, select RSA SecurID Access manages all authentication.

b. Select appropriate primary and additional authentication methods.

c. Click Next Step.

jaink9_4-1644273856616.png

5.On the next page, under Service Provider Metadata enter the following values:

jaink9_5-1644273905985.png

  1. Assertion Consumer Service (ACS) URL Enter the SP Assertion Consumer Service URL obtained from Step 6 of Configure Atlassian Statuspage section.
  2. Service Provider Entity ID - Enter the SP Entity ID obtained from Step 6 of Configure Atlassian Statuspage section.

6. Select Default Service Provider Entity ID in Audience for SAML Response section.

jaink9_6-1644273949106.png

7. In the Message Protection section, under SAML Response Protection, select IdP signs entire SAML response. Click Download Certificate and save the certificate.

jaink9_7-1644273975738.png

8. Click Show Advanced Configuration.

jaink9_8-1644274013873.png

9. Under User Identity section, select the following:

a. Identifier Type: Select Auto Detect.

b. Property: Select Auto Detect.

jaink9_9-1644274041411.png

10. Click Save and Finish.

11. Click the Publish Changes button in the top left corner of the page, and wait for the operation to complete.

jaink9_10-1644274081590.png

12. Navigate to Authentication Clients > Relying Parties and locate Atlassian in the list and from the Edit option, select Metadata and note the entityID and SingleSignOnService POST Location. This will be required in Step 4 of the Configure Atlassian Statuspage section.

 

Configure Atlassian Statuspage

Perform these steps to integrate Atlassian Statuspage with RSA SecurID Access as a Relying Party SAML SP.

Note: Before proceeding, please make sure you have access to Atlassian Access, which is an organization level subscription that connects Atlassian cloud products to the Identity Provider. Also make sure :

a) Your organization is registered and verified in Atlassian Access.

b) Atlassian Statuspage is configured in Atlassian Access.

Procedure

1. Log on to https://admin.atlassian.com as an administrator.

2. Select your organization, then click Security.

jaink9_0-1644274203817.png

3. Select SAML single sign-on and then click on Add SAML configuration.

jaink9_1-1644274232425.png

4.On the Add SAML configuration page, enter the following information:

jaink9_2-1644274263974.png

a. Identity provider Entity ID: Enter the entityID from Step 12 of Configure RSA Cloud Authentication Service section.

b. Identity provider SSO URL: Enter the Identity Provider URL from Step 12 of Configure RSA Cloud Authentication Service section.

c. Public x509 certificate: Open the RSA SecurID Access public certificate downloaded from Step 7 of Configure RSA Cloud Authentication Service section in a text editor. Copy and paste the content of the certificate in this field.

5. Click Save configuration.

6. Once your have added the configuration successfully, you will be able to see the SP information. This information is required in Step 5 of Configure RSA Cloud Authentication Service section.

jaink9_3-1644274305235.png

7. If you want to enforce SAML single sign-on to any policy for your organization, it can be done by checking Enforce single sign-on on that policy in Authentication policies page.

jaink9_4-1644274336384.png

 

Configuration is complete.

For additional integrations, see "Configuration Summary" section.

No ratings
Version history
Last update:
‎2022-02-07 06:13 PM
Updated by:
Contributors
Article Dashboard