- ACCESS-967Allow syncing group description over SCIM
- ACCESS-800Ability to rename groups after they've synced to the organization from an identity provider.
- ACCESS-2135Feature to turn off new product pop ups
- ACCESS-1526Allow non-enterprise customers to temporarily have multiple IDPs
- ACCESS-1805Ability to unlink and relink Atlassian Account from SCIM
- ACCESS-1905Provide the ability to retroactively add Managed accounts to Authentication Policy when marked as default
- ACCESS-1834Automatically move users from local policy to IDP linked policy once they are provisioned
- ACCESS-1540Provide Organization Admins with granular control over managed Bitbucket accounts
- ACCESS-583Create usage report tools
- ACCESS-1481Removing the User from Atlassian Cloud App on IDP should unlink its SCIM ID
- ACCESS-2308Disable the "Remove user" button on the Users page UI for SCIM synced users.
- ACCESS-2392Expand BBC activities tracked in Atlassian Guard audit log
- ACCESS-2439The OAuth 2.0 3LO app should respect the IP allowlist
- ACCESS-1314Pre-fill email of Azure AD login screen when SAML SSO is enforced
- ACCESS-2430Ability to disable the invitation email when integrating Google workspace
- ACCESS-2118Guard Detect full scan option
- ACCESS-2437Enhance Audit Logs to track internal Atlassian system actions and ensure log consistency across platforms.
- ACCESS-1449Auto deactivate Atlassian Accounts based on inactivity
- ACCESS-1511External User Security: Organization audit logging should include events generated by external users
- ACCESS-1653Organization audit logs should show more details for user invite events
- ACCESS-1915Allow External users login via IDP Application Dashboards when enforced with External SAML SSO
- ACCESS-2230Include all kind of login attempt in the audit log
- ACCESS-2435API and UI Data Consistency for Audit Log Exports
- ACCESS-2436Audit logs for Confluence content owner change
- ACCESS-604Grant users synced from identity providers via SCIM application access by default
- ACCESS-668Allow organization admins to have full control over profile visibility settings
- ACCESS-953Identify managed accounts by their sync status in API and UI
- ACCESS-1009Ability to control site/organization access for accounts via user provisioning
- ACCESS-1048IP allowlist on organization administration (admin.atlassian.com)
- ACCESS-1550Grant site admins the option to manage API tokens access for unmanaged users
- ACCESS-1559Ability to export groups from Atlassian Admin
- ACCESS-2347Ability to have Trello Free users not count as billable for Guard
- ACCESS-2398Authorization header instruction for the audit log webhook configuration
- ACCESS-2433Notification to org admins if there are Google Workspace or Azure AD Sync connection issues
- ACCESS-2434Bulk User Export in Organization Audit Log UI
- ACCESS-1498Provide meaningful error messages for SAML assertion errors
- ACCESS-1609Allow automatically redirected to SSO provider when logging into a site
- ACCESS-1660Allow the "manager" attribute to be synced from Azure AD sync for nested groups
- ACCESS-1952Allow Multiple External User Security Policies
- ACCESS-2044Okta : Provision large group membership in batches
- ACCESS-2124Support External user security policy for Bitbucket workspaces that are added or linked to Atlassian organization
- ACCESS-1647Organization admins to be able to track SCIM sync status
- ACCESS-2257Please increase the log retention
- ACCESS-977Ability to exclude or remove a site from User Provisioning (SCIM)
- ACCESS-1164Ability to sync users to sites based on the groups
- ACCESS-625Provide support for OpenID Connect (besides SAML) for SSO
- ACCESS-1296Confluence attachment events on org audit log
- ACCESS-1010Improve SSO enabled user login error messaging
- ACCESS-1021Provide ability to remove synced accounts and groups from the Directory through the UI
- ACCESS-1818Give admins the ability to log out External users
1 of 519