Nexus PRIME -> Smart ID Identity Manager
Nexus Certificate Manager -> Smart ID Certificate Manager
Nexus Hybrid Access Gateway -> Smart ID Digital Access component
Nexus Personal -> Smart ID clients
This article describes how to configure Confluence with SAML connection to Smart ID Digital Access component (as Identity Provider).
A server certificate that will be used for the SAML configuration must be uploaded. An already existing certificate can be used.
In the General Settings tab enter a Display Name. Example: ConfluenceFederation
Check Acting as Identity Provider.
Uncheck Import metadata automatically.
Leave the API Path as it is.
Select a Signing Certificate.
Select an Access Point DNS Name.
Click Add to save the new federation. We will add an Identity Provider shortly.
Go to Confluence to continue the setup.
Enter a Display Name, a unique name used in the system to identify the service provider (that is, Confluence). Example: MyConfluenceServer
Enter Entity ID. This is a unique identifier of the service provider (that is, Confluence). Example: <Url as Confluence knows itself>/confluenceSAML (or jiraSAML)
Enter Service Provider URL. This is the value of the topmost field in the Confluence configuration. Example: https://doc-editor.nexusgrcom/plugins/servlet/saml/auth)
If the Confluence server is protected by Hybrid Access Gateway (that is, configured as a resource) the values should be as the Confluence server knows itself. That is, it could be an ip-address.
The end user in Confluence can now click Corporate Login on the user login page.
(For feedback on product documentation: Select Reason for contact: Feedback on documentation.)
2021 Technology Nexus Secured Business Solutions AB. All rights reserved.
Disclaimer | Terms & Conditions.