-
Suggestion
-
Resolution: Fixed
-
None
Hi,
We are excited to announce that we have shipped the Authentication policies feature. Using this feature you can bypass SSO for certain managed accounts. (https://www.atlassian.com/software/access/guide/elements/authentication-policies#why-apply-multiple-authentication-policies). We are still in the last leg of the rollout. If your organization doesn’t have the feature yet, file a support ticket (https://support.atlassian.com/contact/#/) and we will enable the feature for you.
Thanks,
The Atlassian Access team.
Problem Definition
For unmanaged accounts that are leveraged for purposes similar to add-on accounts, admins have no way of enforcing security policies.
In contrast, for managed accounts, admins have no method to bypass SSO initiated logins.
Suggested Solution
Allow Org Admins the ability the option to configure a managed account to use conventional SSO settings or force authentication against id.atlassian.com but still enforce security policies.
Why this is important
As a Site-admin, its not feasible to establish and maintain local service accounts for a few reasons:
1. Users that login to other Cloud instances wouldn't be redirected to SSO but they would still have security policies applied
2. Atlassian Accounts creates more administrative overhead (now that we have managed accounts it can be viewed as being uncomplimentary)
3. Atlassian Accounts cannot be enforced with security policies
Workaround
No workaround.
- is duplicated by
-
ACCESS-948 Ability to Exclude users from Single Sign On
- Closed
-
ACCESS-115 Allow Organization admins to exclude specific email addresses from SAML
- Closed
- is related to
-
ACCESS-764 Selective user claim
- Closed
-
ACCESS-572 Allow multiple Identity Provider(IdP) configurations for a single org and domain
- Closed
- relates to
-
ACCESS-948 Ability to Exclude users from Single Sign On
- Closed
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...