-
Suggestion
-
Resolution: Fixed
-
None
-
745
-
2
-
-
NOTE: This suggestion is for JIRA Server. Using JIRA Cloud? See the corresponding suggestion.
It would be great if JIRA can support OAuth authentication for IMAP as described on this https://developers.google.com/gmail/xoauth2_protocol
Also:
https://msdn.microsoft.com/en-us/windows/desktop/dn440163
- is blocked by
-
JSDSERVER-6984 Microsoft POP Support for Emails using OAuth 2.0
- Closed
- is duplicated by
-
JRASERVER-70103 Support for IMAP/POP OAuth 2.0 token based auth
- Closed
-
JRASERVER-70154 Add support for Office 365 Modern Authentication in Jira
- Closed
-
JSWSERVER-20381 Allow OAuth2.0 to be used for Incoming Mail
- Closed
- is related to
-
JRASERVER-71130 Removing OAuth2 integration used by incoming mail server integration makes Jira return 500 error for every page
- Closed
-
JRASERVER-43171 OAuth 2.0 Support
- Closed
-
JRASERVER-70154 Add support for Office 365 Modern Authentication in Jira
- Closed
-
JRASERVER-72033 Microsoft POP Support for Emails using OAuth 2.0
- Closed
-
JSDSERVER-6927 Allow Office 365 to use OAuth2.0 on JSD Mail Channel for POP3
- Closed
-
JSDSERVER-6998 Office 365 using OAuth 2.0 doesn't support GCC customers
- Closed
-
JSWSERVER-20411 Allow OAuth2.0 to be used for Incoming Mail
- Closed
-
JRASERVER-68068 Add Exchange Web Services (EWS) to Jira
- Gathering Interest
-
JRASERVER-70442 Improve the incoming email handler to connect to Gmail with OAuth
- Gathering Interest
- relates to
-
CONFSERVER-60017 3-legged OAuth Authentication for IMAP support
- Closed
-
JRACLOUD-63917 3-legged OAuth Authentication for IMAP support
- Closed
-
JRASERVER-43171 OAuth 2.0 Support
- Closed
-
JRASERVER-72166 As a Jira Administrator I want to configure OAuth 2.0 for Outgoing mail (SMTP)
- Closed
-
JOT-347 Loading...
-
RAID-2965 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...