-
Type:
Bug
-
Resolution: Unresolved
-
Priority:
Low
-
Component/s: Directory - Service Accounts
-
None
-
Severity 3 - Minor
Issue Summary
After creating a service account, users can use the "..." > "Grant Access" option to assign service accounts to roles like "App Admin" in Bitbucket IF your Bitbucket Workspace has unified user management enabled.. (If your Bitbucket Workspaces does not have unified user management enabled, then you can't assign any Bitbucket roles to your service accounts, see AX-1684).
However, if your Atlassian Cloud organization has no cloud site associated with it (like a free Jira instance associated with <tenant>.atlassian.net), then trying to assign any Bitbucket role to your service account does not work and you cannot see any Bitbucket access assigned on the "Apps" tab of your service account.
Steps to Reproduce
- Create a brand new organization at admin.atlassian.com/o/create
- Create a new unified user management Bitbucket Cloud Workspace
- Create a new Service Account
- Try to assign any Bitbucket role to the service account from the service account's profile page.
Expected Results
The Bitbucket role is assigned to the service account
Actual Results
No bitbucket role is assigned to the service account.
Workaround
Create a cloud site in your Atlassian organization by creating an app instance like Jira or Confluence. Then, you can successfully assign Bitbucket roles to your service accounts.
- is related to
-
BCLOUD-23832 Ability to add API token scopes for Bitbucket (Service Accounts)
- Gathering Interest