/

Atlassian

Atlassian

The Atlassian Cloud integration configures 1Kosmos as a SAML 2.0 identity provider through Atlassian Administration, applying biometric authentication across all products including Jira, Confluence, Bitbucket, and Statuspage for users on verified domains.

Integration type

SSO

Added

Overview

The Atlassian Cloud integration configures 1Kosmos as a SAML 2.0 identity provider through Atlassian Administration, applying biometric authentication across all products including Jira, Confluence, Bitbucket, and Statuspage for users on verified domains.

This configuration requires an Atlassian Guard Standard subscription (formerly Atlassian Access), a verified organization domain, and an identity provider directory linked to that domain. Once 1Kosmos is configured as the IdP, the SAML SSO policy is enforced through Atlassian's authentication policy settings, which allow gradual rollout by applying the policy to selected user groups before organization-wide enforcement.

Users must exist in the Atlassian organization before SSO is enforced. Atlassian supports just-in-time (JIT) provisioning, which automatically creates Atlassian accounts for users who authenticate through 1Kosmos for the first time, as long as their domain is linked to the IdP directory.


Prerequisites

  • Active 1Kosmos tenant: Community administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • Atlassian Guard Standard subscription: Required to configure SAML SSO in Atlassian Administration. Guard Standard is included with Atlassian Enterprise plans.

  • Atlassian organization with verified domain: At least one domain must be verified in Atlassian Administration before SSO can be configured. Accounts using email addresses from verified domains become managed by the organization.

  • Atlassian administrator fallback account: Create an admin account using an email address from an unverified domain before configuring SSO. This account will not be subject to the SAML policy and provides a fallback if SSO is misconfigured.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for Atlassian:

Field

Where to find it

IdP SSO URL (Sign-On URL)

AdminX → Settings → IdP Configuration → Single SignOn Service URL

IdP Entity ID

AdminX → Settings → IdP Configuration → Core Configuration

Signing Certificate (x.509 PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Values to collect from Atlassian Administration (SP) for AdminX:

Field

Where to find it

SP Entity ID (Audience URI)

Atlassian Administration → Security → Authentication policies → Set up SAML → SP Entity ID field

ACS URL

Same SAML configuration screen; labeled Assertion Consumer Service URL

Unique ID

The alphanumeric string at the end of the SP Entity ID (e.g., if Entity ID is https://auth.atlassian.com/saml/a1b2c3d4, the Unique ID is a1b2c3d4)


Integration steps

Step 1: Create the fallback admin account

  • Before making any SSO changes, create an Atlassian account using an email address on a domain that is NOT verified in your Atlassian organization.

  • Grant this account system administrator rights. This account will bypass the SAML policy and allow recovery if SSO is misconfigured.

Step 2: Start the SAML configuration in Atlassian Administration

  • Log in to admin.atlassian.com and select your organization.

  • Navigate to Security → User security → Authentication policies.

  • Select or create the policy you want to configure SSO for and click Set up SAML single sign-on.

  • On the Add SAML details screen, copy the SP Entity ID and ACS URL values displayed. You will need these for AdminX. Click Next to proceed without saving SAML yet.

Step 3: Add Atlassian as a SAML application in AdminX

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Scroll to Custom App, select SAML 2.0 Generic, and click Add integration.

  • Enter "Atlassian" as the Application Name, set Instance to Production, and enter https://[your-subdomain].atlassian.net as the Application Access URL. Click Next.

  • Set the NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and NameID Value to email.

  • Add claims mappings for email (Username), firstname (first_name), and lastname (last_name). Click Next.

  • Enter the Atlassian SP Entity ID as the Entity ID in AdminX, and the ACS URL as the Assertion Consumer Service URL with Method set to POST. Enable Assertion signing. Click Save.

Step 4: Enter 1Kosmos IdP details in Atlassian Administration

  • Return to the Atlassian SAML configuration screen in admin.atlassian.com.

  • Enter the 1Kosmos SSO URL in the Identity provider SSO URL field.

  • Enter the 1Kosmos Entity ID in the Identity provider Entity ID field.

  • Paste the 1Kosmos x.509 signing certificate into the Public x.509 certificate field.

  • Click Save configuration.

Step 5: Link a domain to the IdP directory

  • On the next screen, select the verified domain you want to associate with the 1Kosmos IdP directory.

  • Click Stop and save SAML to complete the configuration without immediately enforcing SSO.

Step 6: Enforce SSO in the authentication policy

  • Return to Security → Authentication policies and select the policy you configured.

  • Click Enforce single sign-on. This will require all managed users in this policy to authenticate through 1Kosmos.

  • To roll out gradually, apply the policy to a subset of users or a test group before enforcing organization-wide.

Step 7: Test the integration

  • Open an incognito browser window and navigate to your Atlassian product URL (e.g., your-org.atlassian.net).

  • Enter a managed user's email address. You will be redirected to the 1Kosmos login screen.

  • Open the 1Kosmos mobile app, scan the QR code, and complete biometric authentication.

  • Confirm the user is returned to the Atlassian product and has the correct access.



Attribute mappings

Source (1Kosmos)

Target (Atlassian)

Description

user.email

NameID (emailAddress)

Primary SSO identifier; must match the managed Atlassian account email

user.firstName

first_name

User first name

user.lastName

last_name

User last name


Integration notes

One SAML configuration in Atlassian Administration applies to all Atlassian Cloud products under the organization. You do not need to configure SSO separately for Jira and Confluence. Atlassian Guard Standard allows one identity provider per organization on the Standard tier; the Enterprise plan supports multiple identity providers. If JIT provisioning is needed, link your verified domain to the IdP directory after completing the SAML configuration. JIT provisioning creates Atlassian accounts automatically on first login but requires the domain to be linked before it takes effect.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.