- ACCESS-1532Ability to exclude JSM portal from IP allowlist
- ACCESS-1846Ability to add IP Allowlist for JSM and Jira separately.
- ACCESS-1771Reduce the IP address range to be allowlisted based on customer location
- ACCESS-1422Allow customers to configure IP allow list by country (geoblocking)
- ACCESS-1227Allow Org admins to disable email notifications
- ACCESS-1952Allow Multiple External User Security Policies
- ACCESS-2044Okta : Provision large group membership in batches
- ACCESS-2340Allow clear Time selection/General improvements to Audit Log Filtering
- ACCESS-800Ability to rename groups after they've synced to the organization from an identity provider.
- ACCESS-2099Allow customers to map group description on Entra
- ACCESS-2342Providing the option to use Data Classification for automation rules in Jira and JSM
- ACCESS-1533Allow for org and site admin permissions to be assigned via groups (local or provisioned)
- ACCESS-1023Allow the site-admin role to be assigned to a provisioned group
- ACCESS-604Grant users synced from identity providers via SCIM application access by default
- ACCESS-790Allow Group enrollment based on SAML attributes when using Just-In-Time provisioning
- ACCESS-1510Ability to create Email Notifications for Group Membership changes from Audit Log
- ACCESS-1559Ability to export groups from Atlassian Admin
- ACCESS-2203Option to Export a List of Licensed Users from a Specific Site.
- ACCESS-2338Provide feature to prevent page sharing with external users in Confluence
- ACCESS-2339Improvement in Audit Logs for Jira Product Discovered
- ACCESS-1213Sign SAML Requests
- ACCESS-1009Ability to control site/organization access for accounts via user provisioning
- ACCESS-1451Improvements to Idle Session Authentication Policy Options
- ACCESS-2308Disable the "Remove user" button on the Users page UI for SCIM synced users.
- ACCESS-2335Support for OAuth2.0 authentication for SCIM IdP integration
- ACCESS-2337Improve the User exports filter with options to filter managed and unmanaged accounts.
- ACCESS-2325Ability to Reset user sessions in Authentication Policies via REST API
- ACCESS-1911Allow admin to select Group and user type to be synced with Azure AD sync
- ACCESS-2033Control product suggestion and request notifications
- ACCESS-1198More controls over email notifications received by Organization Admins
- ACCESS-1747Allow administrators to set managed users marketing email subscriptions
- ACCESS-1540Provide Organization Admins with granular control over managed Bitbucket accounts
- ACCESS-2334Export/Integrate Access logs with SIEM tool
- ACCESS-592Logging out of Atlassian account does not log out of SAML provider
- ACCESS-1481Removing the User from Atlassian Cloud App on IDP should unlink its SCIM ID
- ACCESS-1946Provide a tool to identify ip and domain blockage in customer environment
- ACCESS-1236Include Atlassian Access features in "Release Tracks" feature
- ACCESS-822Support more synced attributes for SCIM User Provisioning
- ACCESS-2332Summary: Add audit log entries for app additions (e.g., JSM trial) to existing sites
- ACCESS-1040IP allow list: Allow specific policies to only apply to specific products/pages/Spaces/Projects
- ACCESS-1048IP allowlist on organization administration (admin.atlassian.com)
- ACCESS-1274Automatic account deletion base on time
- ACCESS-1449Auto deactivate Atlassian Accounts based on inactivity
- ACCESS-1526Allow non-enterprise customers to temporarily have multiple IDPs
- ACCESS-1628Please include user-created activity for JSM Issues in the Organization Audit Log
- ACCESS-1834Automatically move users from local policy to IDP linked policy once they are provisioned
- ACCESS-2000Cannot unsuspend a SCIM provisioned account(if this account is previously suspended)
- ACCESS-2097Improvement on Content Scanning to secure Sensitive data- Atlassian Guard Premium
- ACCESS-814Implement user and group provisioning with Trello
- ACCESS-979Allow managed account email addresses to be changed to a domain not verified at the organization
1 of 500