Uploaded image for project: 'Identity'
  1. Identity
  2. ID-8781

API Token Expiry alert notifications for Organization Admins

    • 14
    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

    • Jira Software

      Summary

      The suggestion is to generate alerts/notifications close to API Token expiration date for Organization Admins to take action in advance.

      This functionality would greatly streamline our API key management by allowing proactive key renewal or replacement, minimizing service disruptions.

      Current Behavior

      Currently, Jira Cloud does not have a built-in mechanism to alert administrators about the impending expiration of API keys. Administrators must manually track expiration dates, which can lead to oversight and potential service interruptions if a key expires unnoticed.

      Expected Behavior

      A feature that provides automated notifications to organization administrators when an API Key is nearing expiration. This could be implemented as:

      • Email alerts sent to designated administrators a specified number of days before a key expires.
      • An API endpoint or webhook that can be configured to send alerts to an external monitoring system.
      • A dashboard or report within Jira Cloud that lists API keys along with their expiration dates and alert status.

      This feature would enhance administrative oversight and reduce the risk of service disruptions due to expired API keys.

          Form Name

            [ID-8781] API Token Expiry alert notifications for Organization Admins

            Alexander Fedtke added a comment -

            Weird that this feature is missing as this change can break processes and non human user token are more stable then user based token. 

            Alexander Fedtke added a comment - Weird that this feature is missing as this change can break processes and non human user token are more stable then user based token. 

            This is ridiculous that org admins aren't notified of this, nor is there a built in method to alert on expiring tokens. 

             

            We would love to see something ASAP!

            Steve Falzon added a comment - This is ridiculous that org admins aren't notified of this, nor is there a built in method to alert on expiring tokens.    We would love to see something ASAP!

            It would be great to have a dasboard or API endpoint allowing for quering tokens associated with service acccounts. Hopefully that's possible to achieve

            3b7e8d4a85c6, maybe as a workaround you can use email aliases? So emails sent to technical accounts will be also recieved for instance by your team's mailbox? Just an idea

            Marek Bujak added a comment - It would be great to have a dasboard or API endpoint allowing for quering tokens associated with service acccounts. Hopefully that's possible to achieve 3b7e8d4a85c6 , maybe as a workaround you can use email aliases? So emails sent to technical accounts will be also recieved for instance by your team's mailbox? Just an idea

            We use technical accounts for integration with various systems where we do not check its email address. So in case an API is expired we would not know about it since the email is sent only to the owner of the API key. For us it would be helpful to sent the email to org admins as well.

            Patrik Kellner added a comment - We use technical accounts for integration with various systems where we do not check its email address. So in case an API is expired we would not know about it since the email is sent only to the owner of the API key. For us it would be helpful to sent the email to org admins as well.

              Unassigned Unassigned
              5c44fabb84d9 Delfino Rosales
              Votes:
              17 Vote for this issue
              Watchers:
              18 Start watching this issue

                Created:
                Updated: