Atlassian Access
Atlassian Access is an organization-wide subscription that connects your Atlassian cloud products to your identity provider. It allows you to enable enterprise-grade authentication features, and additional oversight, across your company domains.
Features
- Unified user and policy management
- SAML single sign-on
- User provisioning (SCIM)
- Enforced 2FA
- Password policies
Benefits
- Manage users and security policies in one simple place
- Protect your organisation
- Increase security and simplify login
- Automate user lifecycle management
- Require additional verification upon login
- Set password strength and expiry
Pricing
£235 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 0 6 8 9 4 3 4 2 6 3 8 6 8 2
Contact
EFICODE UK LIMITED
Jon Olsen
Telephone: +44 (0) 845 459 9530
Email: licensing_uk@eficode.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Infrastructure must be Atlassian certified
- System requirements
- Web application - users access via web browser
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- May differ at weekends
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Self-help resources support; online ticket creation; weekday coverage 24x5
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User documentation is provided and included. Onsite training is provided at request and subject to additional charge.
- Service documentation
- No
- End-of-contract data extraction
- Xml export
- End-of-contract process
- Customer has ability to migrate data to alternative service.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
About the user management REST API
Use this REST API to administer and edit the managed accounts in your organization by account ID. You can find the account ID for a user with get users in an organization.
Authentication and authorization
To use the user management REST API you must have a valid API key. The API key protects the API and ensures that you have permission to update and deactivate the accounts owned by your organization. You can use the same API key for the organizations REST API and the user management REST API. For more information, see Create an API key.
Once you have your API key, you can provide it as a bearer token in the Authorization part of your HTTPS header.
Version and URI
This documentation is for version 1 of the user management REST API. The URIs for resources have the following structure:
Copy
https://api.atlassian.com/users/<resource-name> - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Each deployment sized in accordance with requirements.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Atlassian
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Out of the box Admin feature.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Xml
- Data import formats
-
- CSV
- Other
- Other data import formats
- Xml
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- Other
- Other protection between networks
- Varies depending on customer requirements
- Data protection within supplier network
- Other
- Other protection within supplier network
- Varies depending on customer requirements
Availability and resilience
- Guaranteed availability
- Varies on deployment type and customer requirements.
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Variety of options available dependent on requirements.
- Access restriction testing frequency
- Never
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Available on request
- Information security policies and processes
- N/A
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Dependent on customer SLA
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Varies on deployment type and customer requirements.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Varies on deployment type and customer circumstances
- Incident management type
- Undisclosed
- Incident management approach
- Varies on deployment type and customer circumstances.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Available on request. - Covid-19 recovery
-
Covid-19 recovery
Available on request. - Tackling economic inequality
-
Tackling economic inequality
Available on request - Equal opportunity
-
Equal opportunity
Available on request - Wellbeing
-
Wellbeing
Available on request
Pricing
- Price
- £235 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day free trial