SecSign ID Plugin: On-premise Confluence Setups with SAML

2018-03-11 5 minutes to read
Tutorial Index

Protect your Confluence Account with secure authentication from SecSign ID

Simply integrate the SecSign ID Two-Factor Authentication plugin and offer your users secure authentication with your Confluence system, including convenient SSO setups. Connect your on-premise directory service for simple user management and added two-factor authentication security. Use SecSign ID Confluence two-factor authentication for your Confluence account with SAML to securely protect all your data and access points and. Works for iOS or Android mobile devices as well as for desktop.

Confluence is a web application for operational project management as well as for error management and troubleshooting. It was developed by the company Atlassian. Confluence has comprehensive features and a high adaptability. Thus, the functionality of Confluence can be optionally expanded or adapted by using plugins (add-on’s).

By adding SecSign ID Two-Factor Authentication the login is protected from hacker attacks while offering a convenient login experience for the user.

For on-premise Confluence protection without SAML please refer to our guide on the integration of our SecSign ID on-premise Confluence plugin.

Confluence on-premise protection

To add on-premise authentication protection to your Cloud Atlassian setup, please refer to our SAML integration with the Atlassian Identity Manager.

Cloud Confluence on-premise protection

Questions? Feel free to get in touch with us if you need help setting up your SecSign ID plugin or to request a plugin for a not yet supported environment.

Integration in your setup

Integration of the plugin into your setup

SecSign ID Integration

Please configure your desired integration of the SecSign ID Two Factor Authentication

Choose a system, where you want to add the secure login

Do you need your own ID Server inside your protected network or prefer if we manage and maintain it for you

The location to save the assigned SecSign IDs to a user account or the IDM alltogether

System to protect
The System you want to protect - Choose a system, where you want to add the secure login
SecSign ID Server location
Do you need your own ID Server inside your protected network or prefer if we manage and maintain it for you
User account location
The system to save the assigned SecSign IDs to a user account or the IDM alltogether
edit the settings to change the integration
2FA blind
2FA no AP
2SA no AP
2SA blind
Custom ID
IDP Custom Website
Enrollment initiated by SP
Enrollment with IDM
Show Network
Hide Network
Request Solution
The authentication was successful


To integrate the SecSign ID Two-Factor Authentication with Confluence you first need to setup an account with Confluence and have administrative access rights. More information about setting up an account and managing user rights are available on the Confluence website.

You also need access to the SecSign ID administrative panel. If you need assistance managing your administrative account please contact us.

SecSig ID Settings

Edit SecSig ID administrative Settings

Log-in to the administration page of the SecSign ID Server and navigate to SAML Service Provider from the menu. Select “New SAML service provider”.

Enter the following parameter in the corresponding fields.

Name for example: Confluence

NameID Attribute store: SecSign ID Server
NameID source attribute: SecSign ID
Please leave Format blank.

Service Provider Issuer: https://< your Confluence server >/plugins/servlet/samlsso
SAML response URL: https://< your Confluence server >/plugins/servlet/samlsso
RelayState left blank
Audience Restriction: https://< your Confluence server >/plugins/servlet/samlsso
Auth Context left blank

User group to sign: The user group to which you have assigned a
technical user owning the private key to sign SAML responses.
user group name: “SAML response signers.”
Hash algorithm: Server selects.
PSS padding: Server selects.
No SAML attributes selected.

Save the settings.

Navigate to “User groups” and select the user groups whose members shall be allowed to log-in at your Confluence server.

Double click the newly created SAML Service Provider in the list and
then copy the URL beside “Import the IdP SAML meta data from this URL”.

Confluence Settings

Edit Confluence administrative Settings

Use a different browser to log-in at your Confluence server. Navigate to the Add-on Menu. Select “SAML Single Sign On (SSO) for Confluence by Resolution Reichert Network Solutions GmbH” and install it.

Go to the SAML Single Sign-On Plugin Configuration.
Select Add an IdP and enter the following parameter:

IdP Type: Import Metadata from URL
Name for example: SecSign ID
Description (for example): SecSign ID Server

Click next.

Paste the metadata URL copied from the SecSign ID Server.
Click Import, followed by Next.

No changes needed in the dialog “User ID attribute and transformation”.

Continue and check “Enable User creation or update” if necessary.

Save the settings and select Next since you already set-up the IdP (the SecSign ID server).

Start the test and verify a successful SecSign ID log-in.

Then click on Next.
Check “Enable SSO Redirect” if required.

Select “No redirection after logout”, then Save and Close.

We offer SAML solutions for any setup – tailored for your needs

Do you have a service that needs SAML two-factor authentication protection? You didn’t find any information about your setup? We offer custom solutions for almost any SAML setup. Message us for a fast and convenient solution for your service.

    Do you intend to operate the SecSign ID Two-Factor Authentication server On-Premise or in the cloud?

    Your own ID-Server

    On premise installations of SecSign ID offer the flexibility to connect with your preferred servers, services, and devices. And you can customize the SecSign ID with your own organization’s branding.

    Learn More
    On Premise 2FA ID

    Latest Blog Posts, Updates & Features

    SecSign ID Server passed FIDO Certification

    We are happy to announce that the SecSign ID server has passed the official FIDO certification program of the FIDO Alliance. This will allow you to use the complete FIDO2/WebAuthn standard for passwordless 2FA sign-ins in your exi ...

    Mehr Lesen

    Two-Factor Authentication with Fido2 / WebAuth

    The FIDO2 Project is a set of standards developed by the FIDO Alliance and the World Wide Web Consortium (W3C) to create a strong authentication protocol for the web. It consist mainly of the WebAuth standard for the browser part ...

    Mehr Lesen

    Protecting the Home Office VPN with 2FA

    In the recent weeks, home office work has increased potentially. And while employees are practicing social distancing from their home computer, attackers are working hard to exploit security issues in this situation that is unfami ...

    Mehr Lesen
    SecSign 2FA