Configuring PingFederate for mutual SSL authentication
Steps
-
Configure a secondary SSL port. See the property
pf.secondary.https.port
in the table under Configuring PingFederate properties. -
Import the SSL Certificate of your Atlassian server into PingFederate. See Manage trusted certificate authorities in the PingFederate documentation. If you do not have an SSL certificate for the Atlassian server you can use PingFederate’s Client Key/Certificate Utility to create one:
-
From PingFederate’s Admin Page go to:
Server Configuration > Certificate Management > SSL Client Keys & Certificates
: -
Click
Create New
. -
For Common Name, enter the domain of your Atlassian server.
-
Input a value for Organization.
-
Optionally fill out the remaining fields.
-
Click
Next
. -
Click
Done
. -
From the list of certificates click
Export
on your new certificate: -
Choose Certificate and private key.
This creates a PKCS 12 certificate file (p12 extension), which will be used later in this guide.
-
Click Previous and
Export
once again but this time choose Certificate.This will export the certificate file (crt extension).
-
Import this certificate into PingFederate as a Trusted CA (
Server Configuration > Certificate Management > Trusted CAs
).See Manage trusted certificate authorities in the PingFederate documentation for more information.
-
-
Create an instance of Reference ID SP Adapter.
For a complete guide, see Configuring a Reference ID SP Adapter instance in the Agentless Integration Kit documentation.
-
Clear the User Name and Pass Phrase fields.
-
Input a value for Allowed Subject DN. For example, for the certificate shown in section 2.h. above, the DN would be:
CN=jira-server.com, O=ACME Inc., C=US
. -
From the Transport Mode list, select Query Parameter.
-