Your own ID-Server
On premise installations of SecSign ID offer the flexibility to connect with your preferred servers, services, and devices. And you can customize the SecSign ID with your own organization’s branding.
Learn MoreSimply integrate the SecSign ID Two-Factor Authentication plugin and offer your users secure authentication with your Bitbucket system, including convenient SSO setups. Connect your on-premise directory service for simple user management and added two-factor authentication security. Use SecSign ID Bitbucket two-factor authentication for your Bitbucket account with SAML to securely protect all your data and access points and . Works for iOS or Android mobile devices as well as for desktop.
Bitbucket is a web application for version control repository hosting service that can be used for source code and development process. It was developed by the company Atlassian. Bitbucket has comprehensive features and a high adaptability.Thus, the functionality of Bitbucket can be optionally expanded or adapted by using plugins (add-on’s).
SecSign ID is a plugin for real two-factor authentication (2FA) for Bitbucket. 2FA adds another layer of security to your installation by using a second token. In this case the physical token is your smartphone.
For on-premise Bitbucket protection without SAML please refer to our guide on the integration of our SecSign ID on-premise Bitbucket plugin.
Bitbucket on-premise protection
To add on-premise authentication protection to your Cloud Atlassian setup, please refer to our SAML integration with the Atlassian Identity Manager.
Cloud Bitbucket on-premise protection
To integrate the SecSign ID Two-Factor Authentication with Bitbucket you first need to setup an account with Bitbucket and have administrative access rights. More information about setting up an account and managing user rights are available on the Bitbucket website.
You also need access to the SecSign ID administrative panel. If you need assistance managing your administrative account please contact us.
Log-in to the administration page of the SecSign ID Server and navigate to SAML Service Provider from the menu. Select “New SAML service provider”.
Enter the following parameter in the corresponding fields.
Name for example: Bitbucket
NameID Attribute store: SecSign ID Server
NameID source attribute: SecSign ID
Please leave Format blank.
Service Provider Issuer: https://< your Bitbucket server >/plugins/servlet/samlsso
SAML response URL: https://< your Bitbucket server >/plugins/servlet/samlsso
RelayState left blank
Audience Restriction: https://< your Bitbucket server >/plugins/servlet/samlsso
Auth Context left blank
User group to sign: The user group to which you have assigned a
technical user owning the private key to sign SAML responses.
Example
user group name: “SAML response signers.”
Hash algorithm: Server selects.
PSS padding: Server selects.
No SAML attributes selected.
Save the settings.
Navigate to “User groups” and select the user groups whose members shall be allowed to log-in at your Bitbucket server.
Double click the newly created SAML Service Provider in the list and
then copy the URL beside “Import the IdP SAML meta data from this URL”.
Use a different browser to log-in at your Bitbucket server. Navigate to the Add-on Menu. Select “SAML Single Sign On (SSO) for Bitbucket by Resolution Reichert Network Solutions GmbH” and install it.
Go to the SAML Single Sign-On Plugin Configuration.
Select Add an IdP and enter the following parameter:
IdP Type: Import Metadata from URL
Name for example: SecSign ID
Description (for example): SecSign ID Server
Paste the metadata URL copied from the SecSign ID Server.
Click Import, followed by Next.
No changes needed in the dialog “User ID attribute and transformation”.
Continue and check “Enable User creation or update” if necessary.
Save the settings and select Next since you already set-up the IdP (the SecSign ID server).
Start the test and verify a successful SecSign ID log-in.
Then click on Next.
Check “Enable SSO Redirect” if required.
Select “No redirection after logout”, then Save and Close.
On premise installations of SecSign ID offer the flexibility to connect with your preferred servers, services, and devices. And you can customize the SecSign ID with your own organization’s branding.
Learn MoreWe are happy to announce that the SecSign ID server has passed the official FIDO certification program of the FIDO Alliance. This will allow you to use the complete FIDO2/WebAuthn standard for passwordless 2FA sign-ins in your exi ...
Mehr LesenThe FIDO2 Project is a set of standards developed by the FIDO Alliance and the World Wide Web Consortium (W3C) to create a strong authentication protocol for the web. It consist mainly of the WebAuth standard for the browser part ...
Mehr LesenIn the recent weeks, home office work has increased potentially. And while employees are practicing social distancing from their home computer, attackers are working hard to exploit security issues in this situation that is unfami ...
Mehr LesenWant to learn more about SecSign’s innovative and highly secure
solutions for protecting your user accounts and sensitive data?
Use our contact form to submit your information, and a SecSign sales representative will contact you within one business day.
If you need assistance with an existing SecSign account or product
installation, please see the FAQs for more information on the most common questions. You don’t find the solution to your problem? Don’t hesitate to contact the
Product Support
I am Interested in