-
Bug
-
Resolution: Fixed
-
Medium
-
None
-
4
-
Minor
-
Issue Summary
Unverified accounts can be be managed using the admin APIs. The following endpoints cannot be used against unverified accounts.
GET /users/{account_id}/manage/profile PATCH /users/{account_id}/manage/profile PUT /users/{account_id}/manage/email POST /users/{account_id}/manage/lifecycle/disable POST /users/{account_id}/manage/lifecycle/enable
Steps to Reproduce
Use the admin API to deactivate an unverified account.
curl --request POST \ --url 'https://api.atlassian.com/users/<UNVERIFIED_ACCOUNTID>/manage/lifecycle/disable' \ --header 'Authorization: Bearer <ORG_APITOKEN>' \ --header 'Content-Type: application/json' \ --data '{ "message": "..." }'
Expected Results
The unverified account should be deactivated.
Actual Results
Error message returned
< HTTP/2 403 {"key":"forbidden.targetUnverified", "context":"Error: Cannot perform action on unverified account", "errorKey":"forbidden.target-unverified", "errorDetail":"Error: Cannot perform action on unverified account"}
Workaround
Perform the deactivation via the org managed account admin interface if possible.
- is duplicated by
-
ID-7677 Org API does not work for unverified accounts
-
- Closed
-
-
ID-7762 User Management level API endpoints would throw an error for unverified accounts
-
- Closed
-
- is related to
-
ACCESS-1015 Unable to deactivate or delete unverified accounts
-
- Closed
-
- has action
-
KIRBY-2142 Loading...
(2 mentioned in)
Awesome, thank you Luey! We'll test it out!