-
Suggestion
-
Resolution: Done
-
180
-
Problem Definition
Atlassian accounts are able to generate API tokens for use with Jira and Confluence cloud APIs. At the moment, org admins can only revoke these tokens but they cannot enforce policies on the token usage of their managed accounts.
Suggested Solution
If a user belongs to an organization, give admins the following abilities:
- Enable or block a managed account from issuing tokens
- Make the creation of API tokens admin-only
- Log or track the creation of API tokens (such as in audit logs)
- Set a default expiration for the tokens that can be created (ie, 1 week, unlimited not allowed). see ID-7825
- Have the ability to extract a report of all users that currently have API tokens
- Track whether API Keys are used by User in any project
- Track report on API Keys usage.
- is duplicated by
-
ACCESS-852 Improve overall API Token management/logging
- Closed
-
ACCESS-1159 Org administration for API tokens
- Closed
- is related to
-
ACCESS-727 Better visibility/UI for viewing API token use
- Closed
-
ACE-3014 Loading...
-
ACE-3068 Loading...
-
ENT-62 Loading...
- relates to
-
ACCESS-727 Better visibility/UI for viewing API token use
- Closed
-
ACCESS-852 Improve overall API Token management/logging
- Closed
-
ID-7442 Have more thorough logs about the API Token usage
- Gathering Interest
- addresses
-
ACE-625 Loading...
- blocks
-
MOVE-53454 Loading...
- has action
-
ARGS-438 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...