EFICODE UK LIMITED

Atlassian Access

Atlassian Access is an organization-wide subscription that connects your Atlassian cloud products to your identity provider. It allows you to enable enterprise-grade authentication features, and additional oversight, across your company domains.

Features

  • Unified user and policy management
  • SAML single sign-on
  • User provisioning (SCIM)
  • Enforced 2FA
  • Password policies

Benefits

  • Manage users and security policies in one simple place
  • Protect your organisation
  • Increase security and simplify login
  • Automate user lifecycle management
  • Require additional verification upon login
  • Set password strength and expiry

Pricing

£235 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at licensing_uk@eficode.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 0 6 8 9 4 3 4 2 6 3 8 6 8 2

Contact

EFICODE UK LIMITED Jon Olsen
Telephone: +44 (0) 845 459 9530
Email: licensing_uk@eficode.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Infrastructure must be Atlassian certified
System requirements
Web application - users access via web browser

User support

Email or online ticketing support
Yes, at extra cost
Support response times
May differ at weekends
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Self-help resources support; online ticket creation; weekday coverage 24x5
Support available to third parties
Yes

Onboarding and offboarding

Getting started
User documentation is provided and included. Onsite training is provided at request and subject to additional charge.
Service documentation
No
End-of-contract data extraction
Xml export
End-of-contract process
Customer has ability to migrate data to alternative service.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
About the user management REST API
Use this REST API to administer and edit the managed accounts in your organization by account ID. You can find the account ID for a user with get users in an organization.

Authentication and authorization
To use the user management REST API you must have a valid API key. The API key protects the API and ensures that you have permission to update and deactivate the accounts owned by your organization. You can use the same API key for the organizations REST API and the user management REST API. For more information, see Create an API key.

Once you have your API key, you can provide it as a bearer token in the Authorization part of your HTTPS header.

Version and URI
This documentation is for version 1 of the user management REST API. The URIs for resources have the following structure:

Copy
https://api.atlassian.com/users/<resource-name>
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Each deployment sized in accordance with requirements.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Atlassian

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Out of the box Admin feature.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Xml
Data import formats
  • CSV
  • Other
Other data import formats
Xml

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Other
Other protection between networks
Varies depending on customer requirements
Data protection within supplier network
Other
Other protection within supplier network
Varies depending on customer requirements

Availability and resilience

Guaranteed availability
Varies on deployment type and customer requirements.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Variety of options available dependent on requirements.
Access restriction testing frequency
Never
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Available on request
Information security policies and processes
N/A

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Dependent on customer SLA
Vulnerability management type
Undisclosed
Vulnerability management approach
Varies on deployment type and customer requirements.
Protective monitoring type
Undisclosed
Protective monitoring approach
Varies on deployment type and customer circumstances
Incident management type
Undisclosed
Incident management approach
Varies on deployment type and customer circumstances.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Available on request.
Covid-19 recovery

Covid-19 recovery

Available on request.
Tackling economic inequality

Tackling economic inequality

Available on request
Equal opportunity

Equal opportunity

Available on request
Wellbeing

Wellbeing

Available on request

Pricing

Price
£235 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at licensing_uk@eficode.com. Tell them what format you need. It will help if you say what assistive technology you use.