- ACCESS-1164Ability to sync users to sites based on the groups
- ACCESS-2212Ability to have more granular control of the "data export block" for Jira and Confluence
- ACCESS-2320Add hostname to all atlassian log entries
- ACCESS-1946Provide a tool to identify ip and domain blockage in customer environment
- ACCESS-690Allow configuration retention for disabled Atlassian Access subscription
- ACCESS-2205Customization of 2FA Notification Emails
- ACCESS-1952Allow Multiple External User Security Policies
- ACCESS-2357Provide customization options for the Organization Audit Logs webhook body
- ACCESS-1449Auto deactivate Atlassian Accounts based on inactivity
- ACCESS-800Ability to rename groups after they've synced to the organization from an identity provider.
- ACCESS-2358Include SailPoint as a supported identity provider
- ACCESS-2356Make the SCIM error logs easily understandable
- ACCESS-604Grant users synced from identity providers via SCIM application access by default
- ACCESS-621Ability to provision users to Bitbucket Cloud repositories with SCIM
- ACCESS-814Implement user and group provisioning with Trello
- ACCESS-1023Allow the site-admin role to be assigned to a provisioned group
- ACCESS-1051SSO on the Atlassian cloud site level
- ACCESS-1533Allow for org and site admin permissions to be assigned via groups (local or provisioned)
- ACCESS-1784Azure AD Connect Notification for Expired Credentials
- ACCESS-2349Restrict data export block to certain roles/groups
- ACCESS-2355Data classification for Confluence sites with premium license
- ACCESS-1526Allow non-enterprise customers to temporarily have multiple IDPs
- ACCESS-668Allow organization admins to have full control over profile visibility settings
- ACCESS-1009Ability to control site/organization access for accounts via user provisioning
- ACCESS-1278Improve Audit log entries about the deletion of draft Confluence pages
- ACCESS-1782Ability to turn [Has access on site] toggle off by default
- ACCESS-1831Ability to export/display Last Authenticated date to the User’s last active dates
- ACCESS-2135Feature to turn off new product pop ups
- ACCESS-2347Ability to have Trello Free users not count as billable for Guard
- ACCESS-1759Audit log doesn't capture event - Export Jira issue to Word
- ACCESS-991Increase audit log storage and export
- ACCESS-1010Improve SSO enabled user login error messaging
- ACCESS-1208Notification service for SCIM provisioning
- ACCESS-1314Pre-fill email of Azure AD login screen when SAML SSO is enforced
- ACCESS-1481Removing the User from Atlassian Cloud App on IDP should unlink its SCIM ID
- ACCESS-1540Provide Organization Admins with granular control over managed Bitbucket accounts
- ACCESS-1609Allow automatically redirected to SSO provider when logging into a site
- ACCESS-2223Option to disable External users policy
- ACCESS-2308Disable the "Remove user" button on the Users page UI for SCIM synced users.
- ACCESS-822Support more synced attributes for SCIM User Provisioning
- ACCESS-2105Audit Log: Include project creation/deletion in Org level audit logs
- ACCESS-1497Allow the Atlassian Account email address to be mapped to an attribute via Azure AD sync
- ACCESS-1050Add OS or device-used to login activity in org audit logs
- ACCESS-1523Allow Synced Groups to be Searched and/or Sorted
- ACCESS-1942Include the multiple Identity providers feature in the Atlassian Guard plans
- ACCESS-2124Support External user security for Bitbucket workspaces that are added or linked to Atlassian organization
- ACCESS-2345Have a setting to prevent synced users from being assigned to a local group
- ACCESS-1356Limit the amount of provisioned data available to a site
- ACCESS-1236Include Atlassian Access features in "Release Tracks" feature
- ACCESS-2344Allow more classification levels
1 of 482