Step-by-Step Atlassian Access Security Guide

After you’ve migrated to Atlassian Cloud, it’s important to create a strong foundation for your cloud infrastructure. We highly recommend utilizing Atlassian Access, a valuable resource to help you implement strong security protocols to keep your instance safe and running smoothly.

Atlassian Access lets you scale your cloud products with the confidence of knowing that an enterprise-grade infrastructure with central administration is behind you.

In this blog post, we’re going to break down how Atlassian Access works and how to utilize its resources so you can implement a strong foundation for your new cloud infrastructure.

What is Atlassian Access

Atlassian Access provides a centralized system to monitor and implement security and governance across every Atlassian cloud product used at your organization including Jira Software, Jira Service Desk, Confluence, Bitbucket, and Trello.

As your organization grows, you’ll be able to scale collaboration and agility with ease knowing that your users and data are safe. Let’s take a quick look at the value of Atlassian Access, to your organization.

Atlassian Access Benefits

  • Unified administration – For busy organizations, utilizing multiple Atlassian Cloud products, Access provides a centralized area to standardize security protocols across all your Atlassian cloud products and users. This means no more shadow IT challenges.
  • Greater security and compliance control – Ensuring success for your organization means protecting your investment as much as possible. Atlassian Access allows you to implement stronger login authentication, gives you visibility and insights into user behavior with audit logs, and allows you to control APIs through tokens.
  • Streamline user permissions – Atlassian Access allows you to sync users and groups from your external directory to your Atlassian products, with a single source to provision and de-provision accounts. This allows you to save time, act quickly,  and reduce the risk of security breaches.

To see these benefits in action, let’s take a closer look at the features provided by Atlassian Access.

Atlassian Features

  • SAML single sign-on (SSO) to help you streamline and secure access.
  • User provisioning and de-provisioning to automate user access permissions.
  • Active Directory sync for added security when users log on.
    • Can use Okta, Azure, OneLogin, etc.
  • Audit Logs give administrators high-level visibility into user behavior.
  • Organization insights give administrators high-level visibility into product adoption.
  • API token controls allow administrators to view and manage API access.
  • Enforced 2FA requires verification during login
  • Security integrations (CASB) allows administrators to monitor user behavior and track suspicious activity.
  • Atlassian Access Support offers advanced support from a specialized, global team.

Getting Started with Atlassian Access

Ready to get started? Here’s a step-by-step guide on how to implement Atlassian Cloud security through Atlassian Access.

  1. Access your organization – As an organization admin, you can access your organization at
  2. Assign your user organization admins – If you aren’t going to be the sole administrator, you can add other administrators by selecting Settings > Administrators from the left navigation to give other users access to the organization.
  3. Verify your organization’s domain – To gain control over an Atlassian account, you must verify your domain to manage Atlassian accounts that belong to that domain. You can repeat this for as many domains as your organization owns.Once complete, all Atlassian accounts with email addresses for those domains will become managed users and appear on your organization’s “Managed Accounts” page.
  4. Determine how security will be enforced – Organizations give you the ability to add, edit, deactivate, and delete accounts, but you also have other options to enhance security through Atlassian Access.
  5. Set up Atlassian Access – For new users, Atlassian offers a 30 day trial of Atlassian Access that you can start under the “Billing” section of your navigation menu.
  6. Incorporate an identity provider – With an identity provider, you can implement automated user provisioning and de-provisioning and automatic lockout of deactivated users. Your identity provider of choice can also enable you to set up your SAML single sign-on (SSO).This will help you make logins consistent across applications and mitigate risk and vulnerability.
  7. Implement 2FA – 2FA (two-factor authentication) is an additional step that ensures secure access by users. The 2FA will require users to authenticate from a third party instead of just logging in with their password.
  8. Begin an audit routine – To gain greater insight into the welfare of your instance and visibility into potentially dangerous user behaviors, begin a cadence of routine audit logging tracking actions. Not only will this safeguard against vulnerabilities, but it also allows you to ensure that security best practices are being implemented by your team.
  9. Educate Your Team – The last step to creating a secure foundation for your organization is to communicate with your team. Make sure all team members have documentation that lays out expectations for the use of security protocols.Also be sure to educate against risky behaviors such as:
  • Avoid including sensitive data in issues.
  • Only provision access as needed. Over-provisioning can increase risk.
  • Include strong password guidelines in addition to SSO and 2FA.
  • Recommend API tokens only for Jira REST API authentication.

Help Implementing Atlassian Access

Whether you are still considering an Atlassian Cloud migration or are new to Atlassian Cloud and curious about the next steps you should take, we invite you to view our latest whitepaper: Lessons Learned from Jira Cloud Migrations. In this white paper, we cover:

  • Organizations optimal for an Atlassian Cloud.
  • Who should use Jira Cloud Migration Assistant to migrate to Atlassian Cloud.
  • Onboarding, governance, and security best practices after migration.

Please review our whitepaper for further guidance, or for an expert approach to Cloud Migration, contact us today.