-
Suggestion
-
Resolution: Done
-
None
-
528
-
Thank you for your active participation and feedback following our announcement of product requests. We want to address some of the feedback we’ve heard and share our strategy for addressing shadow IT risks now and going forward.
The Cloud Enterprise (CE) plan solves the challenges of customers operating our products at a large scale by addressing their complexity, governance, advanced security, and compliance needs. The Atlassian Access product solves for more foundational security requirements and provides identity and access management support. We have implemented solutions for shadow IT risks based on customer differentiation in both CE and Atlassian Access.
The product requests feature will help our CE customers in large, complex environments more closely monitor shadow IT risks as they scale, bolstering our advanced security pillar of CE. For customers with Atlassian Access, we will be adding enhancements to Automatic Product Discovery (APD). The first enhancement is scheduled for release this month and will introduce a new “last active date” field to APD.
With this enhancement, admins will be able to visit the ‘Discovered Products’ tab within Atlassian Administration and easily identify long inactive shadow IT instances and prioritize recently active ones to take action on. The next APD enhancement will provide org admins with one-click access to ‘join’, or add themselves to, shadow IT instances and take over the management of said instance.
In order to track our progress and gain more targeted feedback moving forward, we will now close this ticket and have created separate, linked tickets to address your concerns in smaller forums.
- The enhancements to Automatic Product Discovery for the ‘add admin’ feature
- The request for product request controls in Trello
- The request for product request controls in BitBucket
- The ability to remove managed users from external sites
Best, Griffin
As an administrator, I would like to have the ability to control and configure permissions to my organization's managed accounts, these permissions are:
- Ability to create new sites for Jira, Confluence, JSD
- Ability to create new Bitbucket or Trello accounts
- Ability to join sites or products external to the organization
- Ability to remove managed users from external sites
- Ability to remove access to specific products
Current impact
Not being able to have these controls allows managed accounts to join or create sites under the company's email domain, possibly causing an undesired increase on the Atlassian Access billing, which in some occasions might hit the license seat limit.
- duplicates
-
CLOUD-10325 Allow non-Enterprise administrators to control managed users' associated sites and products
- Closed
- incorporates
-
ACCESS-679 Restrict what applications managed users can access
- Closed
- is duplicated by
-
ACCESS-1135 Need to control or manage; users or user group from creating products
- Closed
-
CLOUD-11413 Allow Org Admins to prevent unauthorized site creation
- Closed
-
ID-7697 Prevent managed users from creating cloud site using a verified domain.
- Closed
-
ACCESS-1317 Need a way to handle Shadow IT after domain claim
- Gathering Interest
-
ID-8013 Any user can sign up with a claimed domain of an organization
- Gathering Interest
- is related to
-
CLOUD-11124 Allow for Notifications and Reporting on Sites Created by Managed Users
- Closed
-
ACCESS-899 Disabling managed users to create repositories on their own account
- Gathering Interest
-
ACCESS-1027 Allow org admins to transfer ownership of products owned by managed accounts
- Gathering Interest
-
ACCESS-1272 Allow to block non-administrators from creating new organizations
- Gathering Interest
-
ACCESS-1284 Notify Managed account Admin when managed account creates new org/instance/signs up for atlassian cloud products
- Gathering Interest
-
BCLOUD-20112 Allow to delete workspace associated with the user account.
- Gathering Interest
-
CLOUD-11240 Allow Administrators to turn off the Slack integration offer for managed users
- Gathering Interest
-
CLOUD-11352 Allow admins to remove the "Discover" and other products from the "Switch to" tab / application navigator
- Gathering Interest
-
ACCESS-571 Allow Organization admins to manage individual application access.
- Gathering Interest
-
ID-6802 Ability to restrict Atlassian account creation for claimed domain
- Gathering Interest
-
ACE-6390 Loading...
-
MOVE-109089 Loading...
-
MOVE-131746 Loading...
-
PCS-83141 Loading...
-
TRELLO-75181 Loading...
-
TRELLO-126186 Loading...
-
TRELLO-137763 Loading...
-
TRELLO-143401 Loading...
-
ENT-114 Loading...
- is superseded by
-
ACCESS-1645 Add admin to unmanaged user-created sites
- Closed
-
BCLOUD-22918 Shadow IT control for Bitbucket
- Closed
-
CLOUD-11684 Shadow IT control for Trello
- Closed
-
CLOUD-11690 The ability to remove managed users from external sites
- Closed
- relates to
-
ID-7516 Unify user management between Jira/Confluence Cloud and Trello
- In Progress
-
ID-6733 Unify user management between Jira/Confluence Cloud and Bitbucket Cloud
- In Progress
-
ACCESS-1135 Need to control or manage; users or user group from creating products
- Closed
-
ACCESS-1608 Allow org admin to control managed users' associated sites and products
- Closed
-
ID-7697 Prevent managed users from creating cloud site using a verified domain.
- Closed
-
TRELLO-144260 Loading...
-
TRELLO-148793 Loading...
-
TRELLO-185382 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
As the Org/Site Admin of my account, it's honestly hard to comprehend that I do not have the ability to block staff in our domain from adding products. We subscribe to Atlassian Access as well, and given the substantial cost of that, it is seriously lacking in functionality and control. Very disappointing that this ticket has been running for 3 years, regardless of the necessity of it. Please Atlassian, stop working on new bells and whistles until you can make the core system do the basics.
Not having this basic level of control, on an expensive cloud app is like leaving the door to your apartment open, trusting the other building residents won't let themselves in. You wouldn't do it at home, don't force your subscribing org admins to do it with our accounts.
If you can't practice zero trust.... you are completely out of touch with modern workplace technology and information security and that is just not acceptable.
I'm sorry if this sounds harsh, but come one... seriously. Security and administrative control by those of us paying for these tenancies has to take higher priority.