If you are using SCIM with your provider, make sure to check out the documentation for configuring this before proceeding. It might be that you need to configure this first or at the same time as setting up SAML.
If you intend to use Managed groups (manage Jira groups from Keycloak), you also need a mapper for group claims. If not, you can skip this step.
Create mapper for Group claims from identity provider:
Set Name and Friendly Name to Group
Set Group attribute name to http://schemas.xmlsoap.org/claims/Group
Set Full group path to OFF
Provide the metadata URL (recommended):
Substitute <keycloak .example.comserver> with the DNS of your Keycloak server.
Substitute the realm identifier <http://example.com > <realm> with your realm.
Alternatively, you can download the metadata file to disk and upload it in the KSSO wizard.
This step shows the certificate used to validate the SAML messages.
Confirm Check that everything looks good .and submit your setup
Test that logging in with Keycloak works as expected. This will help identify if there are any issues with the configuration. Follow the steps to perform the login test.