First posted: Jan 05 2025
Read time: 12 minutes
Written By: Steven Godson
Greetings!
In this article, the second in my series on JIRA Service Management (JSM), I will be exploring the Access Management capabilities available in a JSM project.
This will include looking at the Single Sign On (SSO) options provided by the Atlassian Guard product.
Note: you will need to have Organisation Administrator permissions to implement SSO, as well as having access to your organisations MS Entra ID admin.
The following are a few examples of areas that should be considered, ideally as part of your design for JSM as discussed in the initial article of this series, when planning for managing user access to JSM.
There are three distinct roles, with JSM, that users can be assigned to.
These roles can be assigned in a number of ways which we will explore in the next section.
JSM provides ‘out of the box’ functionality for managing users. It is accessed from the Project Settings menu under Access -> People and access.
The People and access screen is where users of the JSM project can be managed. From this screen you can
To use SSO with any Atlassian product a subscription needs to be taken out for Atlassian Guard. This provides four methods of authenticating users for SSO.
From an architectural perspective this sits outside of JSM and can be considered a global Atlassian product as it controls access across all products that your organisation has signed up to with Atlassian.
These setting are accessed via the Atlassian Administration menu.
This is the simplest way of deploying SSO as it only requires you to have access to the DNS records for the email domain that you want to use for authentication e.g. stevengodson.com.
In the Atlassian Admin menu select Settings then Domains and click on the Verify your company domain button.
Click on Next on this screen.
Enter the domain that you want to verify and click Next.
On the following screen, select the method of verification that you want to use, follow the instructions and click on Verify domain when completed.
You should be taken back to the main Domains screen where your domain will be listed. *Note: this may take several hours to verify depending on the method that you choose.
Once your domain is verified you can claim any existing accounts for users under that domain. From this point any users that are logged into their browser using the verified domain can login, using SSO, to Atlassian Cloud.
Access to specific projects within Atlassian will still need to be granted at the project level following the steps shown in the Basic User Management section of this article.
If you want to be able to control access to your Atlassian projects and products, through your existing federated user management tool, this can be achieved by implementing an Identity Provider integration using SAML and deploying Authentication policies.
This will, with the exception of Google Workspace, require you taking out a subscription to Atlassian Guard, which is licensed based on the number of users claimed rather than active, so I strongly advisee you to check the current pricing and be sure you have a valid business case to proceed.
Once you have setup your Atlassian Guard subscription, or signed up the the free 14 day trial, navigate to the Atlassian Admin -> Security -> Identity Providers screen and select your identity provider.
Note: most of these options will require you to verify your domain prior to setting up any integration.
If the workflow for your specific integration does not cover setting up Authentication policies, I recommend navigating to Administration -> Security -> Authentication policies and creating a new policy for your specific Identity Provider integration to enforce single sign-on for all sync’d users.
These policies give you control over whether
We have come to the end of the fourth article in this series. We have explored the User Access Management controls for JSM.
In the next article we will go through the User Portal which is the main view for Service Desk Agents when work on different request types.
Hopefully this has been useful to you and I wish you well on your ITSM journey…