User provisioning is the process of ensuring user accounts are created, given proper permissions, and maintained across IT infrastructure and Atlassian applications.
Does not scale well in terms of administrator work load.
Can be error-prone.
Duplicate admin work (user accounts must be manually maintained both at the identity provider and within the Atlassian application)
Active directory or LDAP sync
Built into Atlassian product.
Easy integration with any LDAP capable directory.
Usually best option in on-prem environments.
Limited or no support for cloud environments. While some vendors do provide LDAP adapters, they can be cumbersome to use.
Works with any IDP.
Technically simple: Users are created and updated from data passed through the browser, meaning no additional network dependencies.
Scales to “infinite” directory sizes.
Does not remove inactive users.
Group provisioning/claims can be difficult to configure on some IDPs.
Users are able to set their own local passwords in the Atlassian application.
Ability to create, update and delete users automatically
Can be combined with local groups
Express filters and transformations within the Atlassian applications.
Synchronization/snapshot based, so does not scale to very large directory sizes/companies (at a certain point, sync passes simply become too slow).
API Connectors does not support nested groups.
In principle; works with any SCIMv2 compliant IDP.
Scales to any directory size.
SCIM also supports nested groups.
Requires inbound access to the Atlassian application. This has security implications/considerations. It also means more parts of the organization may need to be involved (networking/firewall etc).
Works best in the presence of failover, i.e. Atlassian Datacenter.
Some IDPs don’t provide SCIM at the basic subscription tiers. For example, a Platinum subscription is required for Azure AD.
A note regarding admin users and websudo (
Secure Administrator sessions in Jira and Confluence)
Generally speaking, websudo by using passwords is not possible with users provisioned by JIT, API Connectors, or SCIM. This is because Kantega SSO cannot synchronize or obtain the passwords from the identity provider for such users. Authentication for such users is only possible via SSO, by redirecting to the identity provider. Users then authenticate in the IDP and are redirected back with a proof of identity, i.e. a SAML Response or an ID Token. In version 5.1.0 of Kantega SSO re-login via the a SAML or OIDC based Identity Provider has been added to perform websudo (see below image).
Please be aware that re-authentication requires your IdentityProvider to support the
forceAuthn=true flag (for SAML), and
max_age=0 flags for OIDC. Please verify that re-authentication works by clicking the Re-authenticate with SSO button and see that you are required to log in again (and not just bounce directly back to the admin pages). If you have a problem with re-login for your IdP, please contact us and we will see if there are any ways of enabling the support for this.