Fisheye/Crucible SAML app gives the ability to enable SAML Single Sign On for Fisheye/Crucible Software. Fisheye/Crucible Software is compatible with all SAML Identity Providers. Here we will go through a guide to configure SSO between Fisheye/Crucible and your Identity Provider. By the end of this guide, users from your Identity Provider should be able to login and register to Fisheye/Crucible Software.
To integrate your Identity Provider(IDP) with Fisheye/Crucible, you need the following items:
 
        
<MetadataProviderxsi:type="InlineMetadataProvider" xmlns="urn:mace:shibboleth:2.0:metadata" id="MyInlineMetadata"> 
  <EntitiesDescriptorxmlns="urn:oasis:names:tc:SAML:2.0:metadata"> 
    <md:EntityDescriptorxmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="<ENTITY_ID_FROM_PLUGIN>"> 
      <md:SPSSODescriptorAuthnRequestsSigned="false" WantAssertionsSigned="true" protocolSupportEnumeration= 
          "urn:oasis:names:tc:SAML:2.0:protocol"> 
        <urn:oasis:names:tc:SAML:1.1:nameidformat:emailAddress</md:NameIDFormat> 
        <md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:https-POST" 
          Location="<ACS_URL_FROM_PLUGIN>" index="1"/> 
      </md:SPSSODescriptor> 
    </md:EntityDescriptor> 
  </EntitiesDescriptor> 
</MetadataProvider>
 
<resolver:AttributeDefinitionxsi:type="ad:Simple" id="email" sourceAttributeID="mail"> 
   <resolver:Dependency ref="ldapConnector" /> 
   <resolver:AttributeEncoderxsi:type="enc:SAML2StringNameID" nameFormat="urn:oasis:names:tc:SAML:1.1: 
    nameid-format:emailAddress"/> 
</resolver:AttributeDefinition> 
<afp:AttributeFilterPolicy id="releaseTransientIdToAnyone"> 
<afp:PolicyRequirementRulexsi:type="basic:ANY"/> 
  <afp:AttributeRuleattributeID="email"> 
    <afp:PermitValueRulexsi:type="basic:ANY"/> 
  </afp:AttributeRule> 
</afp:AttributeFilterPolicy> 
| IDP Entity ID | https://<your_domain>/idp/shibboleth | 
| Single Login URL | https://<your_domain>/idp/profile/SAML2/Redirect/SSO | 
| X.509 Certificate | The public key certificate of your Shibboleth server | 
With the Quick Setup method, you can get the SP metadata from the first step of adding an IDP. The steps to initiate Quick Setup are given below :
 
             
            After completing the above steps, you will see the first step of the Quick Setup process. This step deals with setting up your IDP.
Here you will find your SP's metadata. You will need to provide this metadata to your IDP. There are two ways to add this metadata to your IDP.
 Import the metadata
  Import the metadata 
                
 Manually add the metadata
 Manually add the metadataIf you wish to add the metadata manually, then you can choose By manually configuring the metadata on your IDP You will find the following information. These details will need to be provided to your IDP
 
                The next step of the Quick Setup flow deals with setting up IDP metadata on SP. We will pick this up in the next section of the setup guide.
If you have chosen to add your IDP using the Quick Setup flow then you have already completed the first step, which is to add SP metadata to your IDP. Now you can proceed with the second step of the Quick Setup method
This step is where you will be adding your IDP metadata.
 Custom IDP name
  Custom IDP name 
                
 Adding the IDP metadata
  Adding the IDP metadataThere are 3 ways in which you can add your IDP metadata. Use the drop-down to select any of the following methods :
Add your metadata URL in the Enter Metadata URL field.
 
                    Use the Choose File button to browse for your metadata file.
 
                    To configure the IDP manually, you will need to have the following details from your IDP's metadata.
 
                        Once you have added the IDP metadata, click on Save. If the IDP has been added successfully, then you will see a Test and Get Attributes URL. Copt this Url and paste it in separate window to Get the Attributes from IDP.
In this step you will be setting up basic user profile attributes for your SP
 Matching a user
  Matching a user 
                
 Setting profile attributes
  Setting profile attributes 
                 
                 
            If you plan on customizing your IDP setup from the get go, you can find the metadata in the SP Metadata. Here you will find your SP's metadata. You will need to provide this metadata to your IDP. There are multiple ways to add this metadata to your IDP :
 Import the metadata
  Import the metadataDepending on how your IDP accepts the metadata, you can either provide the metadata URL or you can use the Download Metadata button to download an XML file for the same.
 Manually add the metadata
  Manually add the metadataIf you wish to add the metadata manually,you will find the following information in this section. These details will need to be provided to your IDP.
 
      The custom setup flow allows you to dive into the complete set of configurations that we provide to add a SAML Identity Provider. The steps to configure an IDP using the Custom Setup option are :
 Adding IDP Metadata
  Adding IDP MetadataWith the information you have been given by Your IDP team, you can configure IDP settings in 3 ways:
 By Metadata URL
 By Metadata URL 
  
                  By Uploading Metadata XML File
 By Uploading Metadata XML File 
  
         Manual Configuration
 Manual ConfigurationGo to Manual Configuration tab and enter the following details:
 
        Next we will be setting up user profile attributes for Atlassian Application. The settings for this can be found in the User Profile    section.
      
When the user logs into
            Atlassian Application, one of the user's data/attribute coming in from the IDP is used to search the user in Atlassian Application. This is used to detect the user in Atlassian Application and log in the user to the same account. 
You can configure it using steps given below:
Now we will be setting up user group attributes for Atlassian Application. You can replicate your user's groups present on IDP in your SP. There are multiple ways of doing this.
 
        
           
           
                             
                                 
                                 
                                     
                                 
                             Hi! Do you need help with this guide?
  Hi! Do you need help with this guide?Thank you for your response. We will get back to you soon.
Something went wrong. Please submit your query again

If you don't find what you are looking for, please contact us at support-atlassian@miniorange.atlassian.net or raise a support ticket here.
