miniOrange has been a reputed partner for Atlassian and provides secure and reliable Identity and Access Management (IAM) solutions that integrate seamlessly with the customer's existing frameworks. We provide SSO that enables users to securely authenticate with multiple applications by logging in only once - with just one set of login credentials. With the miniOrange OAuth/OIDC SSO apps, you can configure any OAuth/OIDC Provider with your Atlassian stack in just 10 minutes!
Both miniOrange and Atlassian provide OAuth SSO feature in all Atlassian host applications. miniOrange OAuth SSO for Data Center apps are easy to set up and provide a rich set of utility and security features.
We provide help in the installation and setup of the entire plugin
We provide advanced Single Sign-On and Security Features
We provide dedicated support for every query with a quick response
Built over 3+ years with feedback from customers to fit real world usecases
With miniOrange plugin you can configure more than one OAuth/OIDC Providers. So even if your users are scaterred across many Providers, you can allow all of them to Login to Atlassian application using via SSO using miniOrange plugin.
Maintain the same user attributes across your OAuth/OIDC Provider and your Atlassian applications through SSO. With attribute mapping options, profile attributes such as email are updated in the Atlassian applications as per user profile on OAuth Provider when the user logs in via SSO.
You can restrict user access to Atlassian applications by assigning them to groups with required application access permission. We provide various options such as Just In Time provision for a seamless experience.
|Feature||Details||miniOrange SAML Data Center SSO Apps||Atlassian SSO 2.0 app|
|Single Sign-On features|
|Basic Single Sign-On||Support for basic SSO with IDP|
|Support for 20+ IDPs||Provides support and setup guides for all known IDPs|
|Import metadata||Quick plugin setup by importing IDP metadata using file/URL|
|Test configuration||Provision of testing the configuration before rolling out for your users|
|Certificate Rollover||Automatic Sync of IDP Certificates for encryption and signing|
|NameID format||Provision to select the NameID format|
|Download SP Metadata||Quick setup at IDP using SP metadata file/URL|
|Configurable SP URLs||Provision to change the SP URLs in case a proxy is configured|
|Encryption||Provision to Encrypt and Decrypt SAML requests and responses|
|Signed Requests||Provision to send signed SAML requests to prevent request forging
(For eg., by the man in the middle attack)
|Custom Certificates||Provision to configure your own certificates and to generate certificates from the plugin.|
|User and groups Provisioning|
|User Profile Attributes Sync||Support to map user profile attributes to keep the user information on Atlassian application in sync with IDP|
|Login Attribute||Option to choose either the Email address or Username as login attribute|
|Regex for username||Use regex to extract username from any attribute (For eg., email)|
|Permission Management||Manage users permissions by assigning groups with application permissions to users on SSO|
|Group Mapping||Provision to map groups from IDP to local groups|
|On The Fly Group Mapping||Synchronize users groups from IDP to Atlassian application on SSO|
|Force Authentication||Auto Redirect to Identity provider for Login|
|Emergency/Backdoor URL||To allow Atlassian application login page access to a specific set of users (mostly admins)|
|Look and Feel|
|Custom Templates||Provision to customize the Login and Error Pages|
|Custom logout||Provision to customize the Logout Pages and provision to configure a logout URL|
|Remember Login||Feature to remember a user login to avoid multiple logins on the same device|
|Import/Export plugin configurations||Easy to migrate to a new instance. (For eg., Staging to Production instance)|
|Disable Password Reset||Feature to remove the ability from users to reset the password of Atlassian Application|
|Auto Activate Users on SSO||Provision to allow auto activation of users that are deactivated on Atlassian application at the time of SSO|