-
Suggestion
-
Resolution: Done
-
None
-
528
-
Thank you for your active participation and feedback following our announcement of product requests. We want to address some of the feedback we’ve heard and share our strategy for addressing shadow IT risks now and going forward.
The Cloud Enterprise (CE) plan solves the challenges of customers operating our products at a large scale by addressing their complexity, governance, advanced security, and compliance needs. The Atlassian Access product solves for more foundational security requirements and provides identity and access management support. We have implemented solutions for shadow IT risks based on customer differentiation in both CE and Atlassian Access.
The product requests feature will help our CE customers in large, complex environments more closely monitor shadow IT risks as they scale, bolstering our advanced security pillar of CE. For customers with Atlassian Access, we will be adding enhancements to Automatic Product Discovery (APD). The first enhancement is scheduled for release this month and will introduce a new “last active date” field to APD.
With this enhancement, admins will be able to visit the ‘Discovered Products’ tab within Atlassian Administration and easily identify long inactive shadow IT instances and prioritize recently active ones to take action on. The next APD enhancement will provide org admins with one-click access to ‘join’, or add themselves to, shadow IT instances and take over the management of said instance.
In order to track our progress and gain more targeted feedback moving forward, we will now close this ticket and have created separate, linked tickets to address your concerns in smaller forums.
- The enhancements to Automatic Product Discovery for the ‘add admin’ feature
- The request for product request controls in Trello
- The request for product request controls in BitBucket
- The ability to remove managed users from external sites
Best, Griffin
As an administrator, I would like to have the ability to control and configure permissions to my organization's managed accounts, these permissions are:
- Ability to create new sites for Jira, Confluence, JSD
- Ability to create new Bitbucket or Trello accounts
- Ability to join sites or products external to the organization
- Ability to remove managed users from external sites
- Ability to remove access to specific products
Current impact
Not being able to have these controls allows managed accounts to join or create sites under the company's email domain, possibly causing an undesired increase on the Atlassian Access billing, which in some occasions might hit the license seat limit.
- duplicates
-
CLOUD-10325 Allow non-Enterprise administrators to control managed users' associated sites and products
- Closed
- incorporates
-
ACCESS-679 Restrict what applications managed users can access
- Closed
- is duplicated by
-
CLOUD-11413 Allow Org Admins to prevent unauthorized site creation
- Closed
-
ID-7697 Prevent managed users from creating cloud site using a verified domain.
- Closed
-
ACCESS-1135 Need to control or manage; users or user group from creating products
- Gathering Interest
-
ACCESS-1317 Need a way to handle Shadow IT after domain claim
- Gathering Interest
-
ID-8013 Any user can sign up with a claimed domain of an organization
- Gathering Interest
- is related to
-
CLOUD-11124 Allow for Notifications and Reporting on Sites Created by Managed Users
- Closed
-
ACCESS-899 Disabling managed users to create repositories on their own account
- Gathering Interest
-
ACCESS-1027 Allow org admins to transfer ownership of products owned by managed accounts
- Gathering Interest
-
ACCESS-1272 Allow to block non-administrators from creating new organizations
- Gathering Interest
-
ACCESS-1284 Notify Managed account Admin when managed account creates new org/instance/signs up for atlassian cloud products
- Gathering Interest
-
BCLOUD-20112 Allow to delete workspace associated with the user account.
- Gathering Interest
-
CLOUD-11240 Allow Administrators to turn off the Slack integration offer for managed users
- Gathering Interest
-
CLOUD-11352 Allow admins to remove the "Discover" and other products from the "Switch to" tab / application navigator
- Gathering Interest
-
ACCESS-571 Allow Organization admins to manage individual application access.
- Gathering Interest
-
ID-6802 Ability to restrict Atlassian account creation for claimed domain
- Gathering Interest
-
ACE-6390 Loading...
-
MOVE-109089 Loading...
-
MOVE-131746 Loading...
-
PCS-83141 Loading...
-
TRELLO-75181 Loading...
-
TRELLO-126186 Loading...
-
TRELLO-137763 Loading...
-
TRELLO-143401 Loading...
-
ENT-114 Loading...
- is superseded by
-
ACCESS-1645 Add admin to unmanaged user-created sites
- Closed
-
BCLOUD-22918 Shadow IT control for Bitbucket
- Closed
-
CLOUD-11684 Shadow IT control for Trello
- Closed
-
CLOUD-11690 The ability to remove managed users from external sites
- Closed
- relates to
-
ID-7516 Unify user management between Jira/Confluence Cloud and Trello
- In Progress
-
ID-6733 Unify user management between Jira/Confluence Cloud and Bitbucket Cloud
- In Progress
-
ID-7697 Prevent managed users from creating cloud site using a verified domain.
- Closed
-
ACCESS-1135 Need to control or manage; users or user group from creating products
- Gathering Interest
-
ACCESS-1608 Allow org admin to control managed users' associated sites and products
- Gathering Interest
-
TRELLO-144260 Loading...
-
TRELLO-148793 Loading...
-
TRELLO-185382 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...