There is a concern that a Jira user with elevated permissions, like a Jira admin, having access to and using the Atlassian MCP server, creates a risk. In short, we'd like a standard Jira user to be able to use the MCP server, but in some instances, block or prevent a user with elevated Jira permissions from using it. Is that possible?
Welcome to the community.
Going over the documentation, I think not.
https://support.atlassian.com/rovo/docs/getting-started-with-the-atlassian-remote-mcp-server/
Within the article, there is a feedback suggestion option, provide your concern there.
But the same applies to the API and elevated user has more permissions than a normal user, this can't be denied to Jria admins as well.
In my opinion people with elevated rights should no the risks based on the elevated permissions they have.
And if it could be limited admins can't use the option, thant wold be strange, not?
Thank you for the reply.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi @Matt Deimler,
I understand the security concern, but as @Marc - Devoteam mentioned, this would be quite unusual from an access control perspective. Here's why this restriction isn't typically possible:
Technical Reality:
Alternative Approaches:
Recommendation: Focus on governance rather than technical restrictions. Establish clear policies about when/how admins should use MCP, with regular access reviews and monitoring.
The feedback option Marc mentioned is definitely worth using - Atlassian might consider adding granular MCP access controls in future releases.
What specific risk scenario are you trying to prevent? That might help identify better mitigation strategies.
Feel free to DM me if you want to discuss specific security architectures!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.