Atlassian don’t officially support AD FS with Confluence Cloud – but it is working well now I’ve sorted out the issues I was having passing user’s email address through as the nameId claim. Hopefully these instructions can save you some trial and error.
Enable SAML on Atlassian Cloud
- First off – enable SAML on your Atlassian Cloud instance at https://<subdomain>.atlassian.net/admin/saml/edit
- The Identity Provider Entity ID can be found in the Federation Service Properties in ADFS – but typically will look like mine –
https://adfs.jamesnimmo.co.nz/adfs/services/trust
- Identity Provider SSO URL can be found in AD FS Service > Endpoints – look for the SAML 2.0 type, but it should just be
https://adfs.jamesnimmo.co.nz/adfs/ls
- Open up your token signing certificate in AD FS, then select ‘Copy to file’ from the Details tab. Save with Base64 encoded as a txt file – then copy the contents into the Public x509 certificate field.
- Save configuration
Add Relying Party Trust wizard
- Add a Relying Party Trust to AD FS. On the welcome page select ‘Enter data about the relying party manually’
- Select a display name – i.e. Atlassian Confluence
- Use the AD FS profile (supports SAML 2.0)
- Leave the token encryption certificate blank
- Enable support for the SAML 2.0 WebSSO protocol – and enter the SP Assertion Consumer Service URL from the Atlassian Site Administration > SAML section. Currently this is:
https://id.atlassian.com/login/saml/acs
- For the relying party trust identifier, enter the SP Entity ID – currently this is
https://id.atlassian.com/login
Please note, do not be tempted to add additional relying party trust identifiers (I had added some others in here which caused it not to work)
- Optionally configure multi factor authentication settings
Configure the claim rules
- First create a rule to send attributes from Active Directory to Atlassian Cloud. I think the only mandatory claim is the email address.

- Next, add a second rule to Transform an incoming claim
(this is another step I hadn’t figured out the first time I tried to configure SAML – without this step it seems like ADFS doesn’t use the right format for the outgoing name ID).
Test it out
I haven’t got Identity Provider initiated sign on working yet (via the /adfs/ls/idpinitiatedsignon.aspx) – but if you use a RelayState URL – and then put this in your corporate bookmarks etc it should work nicely (replace the <yoursubdomain> part
https://adfs.jamesnimmo.co.nz/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Dhttps%3A%2F%2Fid.atlassian.com%2Flogin%26RelayState%3Dhttps%3A%2F%2F<yoursubdomain>.atlassian.net


This isn’t a free tip, but works well for the networks I manage. One of the challenges for any Systems Administrator is keeping software up to date. I’m not so concerned about actually having the latest version of software so much as making sure if there are any security updates these are taken care of in a low effort way.