Uploaded image for project: 'Identity'
  1. Identity
  2. ID-6305

Provide SCIM API's for managing Atlassian account users

    • Icon: Suggestion Suggestion
    • Resolution: Done
    • None
    • None
    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      Atlassian status as of 7 March 2019

      Hi everyone,

      The Atlassian Cloud app in Azure AD now supports automated user and group provisioning. If you have Azure AD as your identity provider, you can configure the app to automate the provisioning and deprovisioning process. To get it setup, have a read about how automatic user provisioning works with Atlassian Cloud and then follow the instructions on Azure AD.

      As a quick summary:

      Regards,
      The Atlassian Access team

       


      Original request:

      User management REST API in JIRA Cloud do not support user profile updates, this breaks consumer who relay on these API's to update user profiles. 

      Fix: Expose public API's (SCIM standard) for user management which allows consumers to provision, update, delete users directly with Atlasssian account

            [ID-6305] Provide SCIM API's for managing Atlassian account users

            Yes, we did get it sorted. Our Atlassian Cloud app registration within AzureAD was created a long time ago so it didn't have the correct appRoles for the provisioning to work. Our app only had the msiam_access role available, and not the "User" role. The User role is what is filtered on for the provisioning to work. We ended up patching our application registration using the graph api to include an additional appRole called User which then allowed the provisioning to start working once the User role was assigned to the users. 

            Stephen Mahood added a comment - Yes, we did get it sorted. Our Atlassian Cloud app registration within AzureAD was created a long time ago so it didn't have the correct appRoles for the provisioning to work. Our app only had the msiam_access role available, and not the "User" role. The User role is what is filtered on for the provisioning to work. We ended up patching our application registration using the graph api to include an additional appRole called User which then allowed the provisioning to start working once the User role was assigned to the users. 

            Sean Bryceland added a comment - - edited

            @s.mahood did you get a response from Jira or Microsoft on the NotEffectivelyEntitled error. We have the same issue 

            Sean Bryceland added a comment - - edited @s.mahood did you get a response from Jira or Microsoft on the NotEffectivelyEntitled error. We have the same issue 

            akilunov there is SCIM add-on available on Marketplace for Jira Server. Not sure it is Data Center compatible though but certainly works for Server.

            Yevgen Lasman added a comment - akilunov there is SCIM add-on available on Marketplace for Jira Server. Not sure it is Data Center compatible though but certainly works for Server.

            Hi mharley1059103882, and alex.zia, I've emailed you with the hope that I could interview you and understand your setup and requirements better. Our support of SCIM is very new and we are actively looking for enhancements we should consider making; your input would be super valuable for us. – Best, Lingbo (Product manager for SCIM at Atlassian)

            lingbo (Inactive) added a comment - Hi mharley1059103882 , and alex.zia , I've emailed you with the hope that I could interview you and understand your setup and requirements better. Our support of SCIM is very new and we are actively looking for enhancements we should consider making; your input would be super valuable for us. – Best, Lingbo (Product manager for SCIM at Atlassian)

            Dave Meyer added a comment -

            Hi akilunov, this ticket is only for Atlassian's cloud applications (Jira Software Cloud, Jira Service Desk Cloud, and Confluence Cloud, with support for Bitbucket Cloud and Trello coming in the future). We do not currently support SCIM provisioning with Atlassian's Server and Data Center products. However, these products do have several options for LDAP integration.

            Dave Meyer added a comment - Hi akilunov , this ticket is only for Atlassian's cloud applications (Jira Software Cloud, Jira Service Desk Cloud, and Confluence Cloud, with support for Bitbucket Cloud and Trello coming in the future). We do not currently support SCIM provisioning with Atlassian's Server and Data Center products. However, these products do have several options for LDAP integration.

            @Dave Meyer just to confirm - has this already been implemented for Okta in the latest Jira/Confluence Datacenter release? Or is it still in the pipeline?

            Alex Kilunov added a comment - @Dave Meyer just to confirm - has this already been implemented for Okta in the latest Jira/Confluence Datacenter release? Or is it still in the pipeline?

            Hi Dario. The issue isnt related to migrating from on prem to Cloud. It's moving from not using an identity provider for provisioning to using one.

            PSCLOUD-20188 is the issue we have raised. Your colleague Claudiu is investigating.

            There seems to be an issue whereby once a user account is created, there is a unique link to the Azure AD entry, even after completely removing all trace and starting again. We have a fundamental issue where duplicate accounts were created due to mismatching UPN and emails. We have a potential fix to this by changing the attributes in Azure AD for the Atlassian email field from mail to UPN but as the accounts are already created i fear this will only work for new accounts created moving forward. We have about 27 accounts that have managed to duplicate themselves because of this issue and, currently, have no way of resolving it.

            Reiss Snooks added a comment - Hi Dario. The issue isnt related to migrating from on prem to Cloud. It's moving from not using an identity provider for provisioning to using one. PSCLOUD-20188 is the issue we have raised. Your colleague Claudiu is investigating. There seems to be an issue whereby once a user account is created, there is a unique link to the Azure AD entry, even after completely removing all trace and starting again. We have a fundamental issue where duplicate accounts were created due to mismatching UPN and emails. We have a potential fix to this by changing the attributes in Azure AD for the Atlassian email field from mail to UPN but as the accounts are already created i fear this will only work for new accounts created moving forward. We have about 27 accounts that have managed to duplicate themselves because of this issue and, currently, have no way of resolving it.

            Dario B added a comment - - edited

            reiss.snooks1831337561, the behavior you are describing reminds me of ID-6789. Can you let us know the ticket number you have submitted so that we can further look into this?

            s.mahood please raise a support ticket in support.atlassian.com to have your issue further investigated.

            Dario B added a comment - - edited reiss.snooks1831337561 , the behavior you are describing reminds me of ID-6789 . Can you let us know the ticket number you have submitted so that we can further look into this? s.mahood please raise a support ticket in support.atlassian.com to have your issue further investigated.

            We are having some strange issues as well. All our users are listed as NotEffectivelyEntitled if they are assigned to the application through the Users + Groups in AzureAD and the provisioning is set to sync only assigned users and groups. I've raised a ticket with Microsoft who have now passed it to the backend engineering team as they've confirmed that it's all configured correctly. 

            Stephen Mahood added a comment - We are having some strange issues as well. All our users are listed as NotEffectivelyEntitled if they are assigned to the application through the Users + Groups in AzureAD and the provisioning is set to sync only assigned users and groups. I've raised a ticket with Microsoft who have now passed it to the backend engineering team as they've confirmed that it's all configured correctly. 

            There seems to be some strange issues with the AzureAD user provisioning. It appears it tries to sync accounts that failed even after they are no longer in scope to be synced anymore every 30 minutes. There are also issues with duplicate accounts being created if UPN doesn't match Email address. I've logged this with Atlassian but was told to raise it with MS 

            Reiss Snooks added a comment - There seems to be some strange issues with the AzureAD user provisioning. It appears it tries to sync accounts that failed even after they are no longer in scope to be synced anymore every 30 minutes. There are also issues with duplicate accounts being created if UPN doesn't match Email address. I've logged this with Atlassian but was told to raise it with MS 

              vsankin vlad (Inactive)
              asridhara Adarsh
              Votes:
              167 Vote for this issue
              Watchers:
              160 Start watching this issue

                Created:
                Updated:
                Resolved: