This needs to be fixed with a high priority. It is putting a major wrench in the gears of our migration to the Cloud, compared to what we have with Jira Server-
The premise:
For orgs that are paying the extra fee for Atlassian Access, and have claimed the accounts under their email domain, it needs to be in the orgs admins control as to how email addresses and other identifying factors are managed, not Atlassian.
The GDPR argument:
The whole point of paying for Atlassian access is not just to enable SSO, it is to perform identity access management (IAM). This means having visibility to who the account is, and be able to systematically verify that the account performing actions in your Jira instance is the same account as in your Azure Active directory (or other provider). The IAM functions in Atlassian Access need to allow for a company to decide what is visible where. Using the GBPR cover for this decision does not apply to managed accounts, and is an over–interpretation of GDPR. Companies with an explicit business purpose (security & compliance) can per GDPR legislation use a company provided (=managed account) for business purposes. Private and/or non-company provided emails are of course subject to GDPR, but that is a different subject altogether, and should be a seperate debate.
The legal/regulatory/ audit requirement:
It is not an option for many companies such as ours to not manage access to their systems. The requirement is a lot more than just a once a month dump of accounts, and checking who they are. It is among other things about cross application Segregation of Duties (SoD): to be able to check the event by event activity of that account against company defined segregation of duties and approval levels that our company is legally obligated to adhere to, and prove to external auditors/ regulators. There are a whole host of regulatory agencies in several countries that would shut us down if we could not prove who did what, and that regulations were followed. When using Azure AD and SSO, the email prefix is the same as the AD account, and is the unique identifier across all applications in the company. At a bare minimum we need access to the same info we have/had access to in Jira Server: the AD / SSO account (email prefix).
The current (very bad) workaround:
In order to pull compliance data via the APIs, the service accounts that could do the same thing with Server using only browse users permissions, now need to be allocated the Org Admin permissions. Org admin is a "Critical access level", and requires logging and additional auditing to ensure the account used for this only did this and not other things.
Even within workflows, to register and send to other applications the AD account info of the person executing the workflow transition requires a lot of funky workarounds, that I am not sure how the auditors will react to.
The clear fix is for Atlassian Access customers to be able to do IAM, like the sales material alludes to.
> Hi all,
> We have a new API available here: https://developer.atlassian.com/cloud/admin/organization/rest/api-group-users/#api-v1-orgs-orgid-users-search-post that returns the user email address regardless of profile visibility setting.
> Thanks,
> Stefan
If the Customer is not yet added to an org, but the customer is known to be a member of a particular org, how are we to add them to the org from the portal if we cannot see their email?
We cannot find this users email unless they are on an org, based on this request.