...redential in addition to my password, which is great. I can see that I have 2FA enabled on my account at https://id.atlassian.com/manage-profile/security I'd like to force our bitbucket workspace to m...
...riginate from third-party vendors. This is why managing your vendor security risks has become more important than ever. Although you can outsource various services, you can’t outsource the risk. Most t...
...elationships to showing developers how to automate app component creation. In this last part, we're taking on one of the most high-stakes and detail-oriented areas of all: DevOps and Security. A Jira p...
We have had several external users added to our system from the external domain. No one having User Access Admin role approved their access. I've been able to find that for some reason their...
...nique requirements of customers who have heavily customized their Data Center instances. As a security vendor on the Atlassian Marketplace, miniOrange has traditionally been Data Center-focused, w...
In today’s fast-paced enterprise environment, Jira Data Center users need powerful AI tools without compromising security or data privacy. With the new Local LLM integration via LiteLLM and Ollama, S...
Is there a way to unmask the customer email, so the agent/admin role can see the email address of the requestor? without using automation? Currently my portal is public security
At K15t, protecting your data is just as important as helping your team share knowledge. Last year, we earned our ISO 27001:2022 certification, proving we’ve built a strong Information Security M...
I using Jira (mainly for ticketing) am facing problem while putting sensitive information on tickets tagged with security team, when I am asked to share sensitive information like a...
...ata transfer: All AI computations happen on your servers, keeping data private and secure. Compliance-ready: Meets strict regulatory and internal security requirements without compromise....
Hello Atlassian community 👋 I'm Elana, a Product Manager for Audit Log in Cloud! We're currently exploring ways to improve Audit Log in Atlassian Administration, and we’d love to hear your...
Let’s be honest, juggling passwords across tools is outdated. It frustrates users, burdens IT, and invites security risks. That’s where SAML Single Sign-On (SSO) comes in. With SAML SSO, users l...
🚀 We’re excited to announce the latest Smart AI for Jira Cloud release, packed with powerful new features to give admins more control, enhance AI responses, and streamline ticket management. From cu...
Hello Atlassian Community, A lot of teams ask a simple question: “How do we let people outside our organization see a Confluence space for a short time, without buying new licences, and still keep ...
...eferencing numerous Java methods across various classes. While we understand the introduction of stricter security and the use of <velocity-allowlist> in atlassian-plugin.xml M...
...quipo? Unítenos a la Comunidad Atlassian! -- https://ace.atlassian.com/buenos-aires/ #atlassian #atlassiancommunity #ia #ai #jira #jsm #rovo #fedramp #security #cloud
...ecuring your Atlassian environment with 2FA isn’t just a good idea, it’s essential. Let me introduce you to miniOrange Two Factor Authentication (2FA/ MFA), a powerful security plugin built for A...
Hi all, I have some questions about 2 steps verification (2SV) in JIRA data centre (NOT CLOUD!!) I read some doc, but most of it seems for cloud and I'm a bit confused. I understood that 2 steps v...
...upport.atlassian.com/jira/kb/restrict-access-to-certain-jira-issues-based-on-the-value-of-a-custom-field/) but I'm not sure it will achieve our desired outcome. We have some clients who require security c...
Recently, Issue History for Jira app has transitioned to Atlassian Forge and earned the Runs on Atlassian badge. The update offers significantly enhanced app functions, particularly the data security...
I'm interested in integrating these two products but have concerns about security. Our slack instance is internal. Are messages/posts from Slack going to external servers before they go to Trello? I...
...ulnerabilities. These reports are one method of showing that we are actively testing and identifying any security issues that are in our products or services. Our bug bounty program serves as an extension o...
...torage for your workloads • Network configuration: Setting up proper networking, firewalls, and security groups • Operating system maintenance: Regular updates, patches, and security hardening • B...
As organizations continue shifting to the cloud, ensuring data security, regulatory compliance, and access governance has never been more critical. All Atlassian Cloud apps m...
Many organizations find themselves in the position of needing to gather confidential and sensitive information as part of their day-to-day work. This is true for many teams but especially those in HR...
Copied to clipboard