Confluence - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Confluence using OIDC.Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Generic OIDC.
- On the Basic Information page, enter the name for the Service Provider in the Name field.
- Click Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired log in method as either Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Under Connection Profile, provide the following details:
- Authorization Server Issuer URL will be auto populated. This URL is used in the miniOrange configuration to form Authorize Endpoint URL, Token Endpoint URL and User Info Endpoint URL.
- Redirect URL will be Oauth Callback URL obtained from the miniOrange configuration.
- Provide a Client ID.
- Select Client Authentication Method as 'CLIENT_SECRET_BASIC'.
- Provide a Client Secret or generate one by clicking Generate button.
- Provide the scope as 'openid', 'profile', and 'email'.
Refer to the Notes section to add the scope.
- Click Save and Finish.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Notes
To add scopes:- Navigate to Access > OIDC Settings > Scopes.
- After adding all the desired scopes, click Save Settings.
Configure miniOrange Identity Broker
miniOrange as an Identity Provider
Perform these steps to configure miniOrange as an Identity Provider:
Procedure
- Log in to miniOrange admin console: https://login.xecurify.com/moas/login.
- Go to Apps and click + Add Application.
- In Choose Application Type, click Create App under the SAML/WS-FED application type.
- Search for and select Atlassian Cloud (SAML) in the list. If it's not available, search for Custom and set up your application through Custom SAML App.
- Enter the following values in the respective fields (you will receive these values after completing the Atlassian Cloud configuration).
- Custom Application Name: Provide any name.
- SP Entity ID or Issuer: You will receive this after configuring Atlassian Access App.
- Audience URI: Use the same value as SP Entity ID.
- ACS URL: You will receive this after configuring Atlassian Access App.
- Ensure that Sign Response and Sign Assertion are both enabled.
- Select the following values in the corresponding fields:
- Name ID: Select E-Mail Address.
- NameID Format: Select 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified'.
- Click Save.
- Once the app is successfully created, select that app and then click Metadata to obtain the app’s metadata.
- Since miniOrange is being used as a brokering service, go to Information required to authenticate via external IDPs section, and click Show Metadata Details.
- After clicking Show Metadata Details, you will see the metadata details. You will need these details while configuring Atlassian Access App.
miniOrange as a Service Provider
Perform these steps to configure miniOrange as a Service Provider:Procedure
- Log in to miniOrange admin console: https://login.xecurify.com/moas/login.
- From the left navigation bar, select Identity Providers, then click Add Identity Provider.
- Select the OAuth 2.0 tab.
- Enter the following values:
- IDP Name: Select Custom Provider.
- IDP Display Name: Choose any name.
- OAuth Callback URL: The callback URL obtained here is used in the RSA Cloud Authentication Service configuration.
- OAuth Authorize Endpoint: Use the Authorization Server Issuer URL obtained from the RSA Cloud Authentication Service + '/auth'.
- OAuth Access Token Endpoint: Use the Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + '/token'.
- OAuth Get User Info Endpoint: Use the Authorization Server Issuer URL obtained from RSA Cloud Authentication Service + '/userinfo'.
- Client ID: Provide the client ID used in the RSA Cloud Authentication Service configuration.
- Client Secret: Provide the client secret used in the RSA Cloud Authentication Service configuration.
- Grant Type: Select Authorization Code Grant.
- Ensure that Send client credentials in Header and Send Scope in Token Request both are both enabled.
- Provide the Scope as openid profile email.
- Click Save.
Configure Atlassian Cloud
Perform these steps to configure Atlassian Cloud:
- Log in to Atlassian Cloud admin console: https://admin.atlassian.com/
- Select your organization.
- Navigate to the Security tab, select Identity providers from the left sidebar, and then click Choose on the Other provider section.
- Enter any name in the Directory name field, then click Add.
- Select Set up SAML single sign-on.
- You will be redirected to the Add SAML details window. You can get these details from the metadata details section after configuring the miniOrange app:
- Identity provider Entity ID: This is the Identity provider Entity ID or Issuer obtained from the miniOrange Metadata.
- Identity provider SSO URL: This is the SAML Login URL obtained from the miniOrange Metadata.
- Public x509 certificate: Use the X.509 certificate obtained from the miniOrange Metadata.
- Click Next.
- Copy the displayed Service provider entity URL and Service provider assertion consumer service URL. You will need these details for configuring the miniOrange app.
- To enable Single Sign-On (SSO) for managing user accounts, enter the desired domain name to link it with your identity provider. Click Next, then Save.
- Set up the authentication policies by selecting Authentication policies from the left sidebar, then click Add policy.
- Select a directory for your policy and enter the policy name.
- Under Single sign-on, check the Enforce single sign-on checkbox.
- Click the Members tab and click Add members.
- Enter details and click Add Members. Single Sign On (SSO) will apply only to the added members.
- When a user tries to log in to the Atlassian Cloud app, they will be redirected to RSA for authentication through the miniOrange broker.
The configuration is complete.
Return to Confluence - RSA Ready Implementation Guide
Related Articles
Add an OIDC Application 68Number of Views Add a SAML Version 2 SSO Agent Identity Provider 17Number of Views Delete an Application from the Applications List 15Number of Views SAML Applications 24Number of Views Add a Service Provider 55Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?