Uploaded image for project: 'Atlassian Guard'
  1. Atlassian Guard
  2. ACCESS-1533

Allow for org and site admin permissions to be assigned via groups (local or provisioned)

    • 32
    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      With the user provisioning feature in Atlassian Access you can use groups to provide product access, application administration and application permissions. However it is currently not possible to assign the org admin role or the site admin role via groups (local or provisioned).

            [ACCESS-1533] Allow for org and site admin permissions to be assigned via groups (local or provisioned)

            Leo Chung added a comment -

            This enhancement is critical. Need this feature to remove manual task for Enterprise solution, up voted

            Leo Chung added a comment - This enhancement is critical. Need this feature to remove manual task for Enterprise solution, up voted

            Aswin R added a comment -

            There is a need to manage Org admins and Site Admins through Active Directory (AD) groups. Currently, an Org admin has the ability to promote any user to Org admin or Site Admin, which poses a security risk. This is because each organisation member may follow different processes for adding or removing organisation permissions. Additionally, this flexibility can lead to various issues during audits at the enterprise level.

             

            Managing users through Active Directory (AD) groups addresses two key issues.

             

            1. You no longer need to manually add permissions for each individual user. Once a user is added to the AD group, they automatically inherit all the associated permissions, simplifying the process.
            2. Every enterprise has an approved process for adding members to an AD group, often using tools like ServiceNow or Jira. By leveraging this established process, the operational overhead for Atlassian Administrators is significantly reduced.

            Aswin R added a comment - There is a need to manage Org admins and Site Admins through Active Directory (AD) groups. Currently, an Org admin has the ability to promote any user to Org admin or Site Admin, which poses a security risk. This is because each organisation member may follow different processes for adding or removing organisation permissions. Additionally, this flexibility can lead to various issues during audits at the enterprise level.   Managing users through Active Directory (AD) groups addresses two key issues.   You no longer need to manually add permissions for each individual user. Once a user is added to the AD group, they automatically inherit all the associated permissions, simplifying the process. Every enterprise has an approved process for adding members to an AD group, often using tools like ServiceNow or Jira. By leveraging this established process, the operational overhead for Atlassian Administrators is significantly reduced.

            We push all users including admins with special admin accounts to SCIM/SSO. Entra ID allows us to do automated periodic review of groups and memberships. Being unable to assing site and org admin roles to SCIM groups means we have to manually manage and review access to those which are the most improtant priviledges in the org.

            Carl Dittloff added a comment - We push all users including admins with special admin accounts to SCIM/SSO. Entra ID allows us to do automated periodic review of groups and memberships. Being unable to assing site and org admin roles to SCIM groups means we have to manually manage and review access to those which are the most improtant priviledges in the org.

            If it's helpful to anyone in this thread, we've released an app to fix this issue. The Admin Automation app allows your to sync users from any group, into any other group, e.g.

            1. You can sync an IdP group, IdP-Admins, into the site-admins or org-admins group.
            2. You can sync an IdP group into any of the Atlassian default product groups.
            3. You can sync users from the jira-users group into the confluence-users group, ensuring that Jira users always have access to Confluence as well.
            4. You can remove any user from jira-users or confluence-users, if they're not in your special 'All users' group. This is a simple and quick way to ensure new users can't get access/invited to any products without being in your 'key' group.

            Hopefully it can help some of the people on this thread!

            -Kieren
            Co-Founder @ Smol Software | Ex-Atlassian

            Kieren _SmolSoftware_ added a comment - If it's helpful to anyone in this thread, we've released an app to fix this issue. The Admin Automation app allows your to sync users from any group, into any other group, e.g. You can sync an IdP group, IdP-Admins, into the site-admins or org-admins group. You can sync an IdP group into any of the Atlassian default product groups. You can sync users from the jira-users group into the confluence-users group, ensuring that Jira users always have access to Confluence as well. You can remove any user from jira-users or confluence-users, if they're not in your special 'All users' group. This is a simple and quick way to ensure new users can't get access/invited to any products without being in your 'key' group. Hopefully it can help some of the people on this thread! -Kieren Co-Founder @ Smol Software | Ex-Atlassian

            Surprising you can use groups to control so many lower level items, but the "keys to the kingdom" are not protected in this way!  If a hardcoded org admin added others, we have no way of tracking or knowing that until it's too late.

            Isaac Greenberg added a comment - Surprising you can use groups to control so many lower level items, but the "keys to the kingdom" are not protected in this way!  If a hardcoded org admin added others, we have no way of tracking or knowing that until it's too late.

            This is a critical infosec ask where privileged access to be govern by a IDP system's group.

            Dibyandu Roy added a comment - This is a critical infosec ask where privileged access to be govern by a IDP system's group.

            Vivek Balasubramanian added a comment - - edited

            I upvote the need for Group that are SCIM provisioning enabled for Org Admins. This will remove the security loophole of a disgruntled org admin modifying  the security policies prior to his/her departure.

            Thanks Pablo Bastos for raising this.

            Vivek Balasubramanian added a comment - - edited I upvote the need for Group that are SCIM provisioning enabled for Org Admins. This will remove the security loophole of a disgruntled org admin modifying  the security policies prior to his/her departure. Thanks Pablo Bastos for raising this.

              rheda FellowJitster
              ca528a390f48 Pablo Bastos
              Votes:
              54 Vote for this issue
              Watchers:
              41 Start watching this issue

                Created:
                Updated: