You are viewing the Kantega SSO legacy documentation. The new documentation site is:
Skip to end of metadata
Go to start of metadata

Bilderesultat for bitium logo

Setup guide for adding Bitium login to Atlassian products.

This setup guides assumes that Kantega SSO in installed as an add-on to your Atlassian product (JiraConfluenceBitbucketBamboo, or FeCru).

Context: This setup starts in the Configuration page of the Kantega SSO add-on. This configuration page can be found by pressing "Configure" on "Kantega Single Sign-On (SSO)" in list of installed add-ons.

Add an App in Bitium

  • Navigate to Apps, then select Add an App
  • Search for and select saml sp

Naming the application

  • Give your application a name.
  • Select your preferred Type. E.g. Individual Account.
  • Press Install App.

Assign Users (Subscribers)

  • Select Assign Users.
  • Select the preferred accounts.
  • Choose a username for the selected accounts.
  • Press Done.

Adding an identity provider

In Kantega Single Sign-on add an identity Provider of the type "Any SAML 2.0 Identity Provider".


  • Copy the ACS URL.
  • Press Next.

Configure the Single Sign-on App in Bitium

  • In Apps Overview, select the App you just created.
  • Select Single Sign-on.
  • Paste the ACS URl from the previos step into SAML URL.

Download Bitium Metadata

  • If your server has Internet access, copy the metadata URL. (Preferred)
  • If the server does not have Internet access, download the metadata.

Metadata import

  • Import the metadata using one of the options.
  • Pres Next.


  • Give the Identity Provider a name. (Depending on your redirect mode, this name may be visible to end users.)
  • The SSO Redirect URL is automatically imported when using metadata.
  • Press Next.


  • Review the imported signing certificate. (This step is purely informatinal.)
  • Press Next.


  • Select whether users already exist or if you wish to have users automatically created upon login.
  • Note that for users to be created, a name, username and an email must be sent in the SAML response.
  • Optionally assign a default group for new users.


  • Review the Summary.
  • Press Finish.

Testing/configuring the identity provider

After finishing the wizard, you will be sent to the test pages for verification of your setup. Here, you may also perform the last configuration parts. Follow this generic introduction to the test pages and final configuration. AD FS is used as the example here.

  • No labels