Automated User Cleanup & Deactivation for Jira

for Jira Cloud, Jira Data Center 8.19.0 - 9.15.2 and more
  • Supported
  • Jira Service Management
  • Jira

Highly configurable, automated/scheduled, DORA compliance, user activity scanning and cleanup

Visualize user activity

Bring high-priority user maintenance needs into instant focus with easy-to-digest usage graphs.

Automate user cleanup and offboarding

Save time, money, and effort while improving compliance with automation that you control in a User Cleanup Configurator.

Conquer external user management

Eliminate the time-sink associated with managing high-turnover, external users with a purpose-built rules and groups engine.

More details

Inspired by customer feedback from Kantega’s SSO customers, Automated User Cleanup & Deactivation for Jira is a purpose-built Identity & Access Management (IAM) solution that streamlines the administrative burden associated with complex user management requirements.

Automated User Cleanup & Deactivation for Jira facilitates scalability, allowing organizations to effortlessly accommodate changes in user access requirements as the system grows.

Empower your organizations to optimize user administration and license consumption, bolster security, and create bandwidth for more important administrative tasks.



This app offers additional security, reliability, and support through:

  • Cloud security participation
  • Reliability checks
  • 24hr support response time
  • and more.

Privacy and security

Privacy policy

Atlassian's privacy policy is not applicable to the use of this app. Please refer to the privacy policy provided by this app's partner.

Partner privacy policy


Integration Details

Automated User Cleanup & Deactivation for Jira integrates with your Atlassian product. This remote service can:

  • Take Jira administration actions (e.g. create projects and custom fields, view workflows, manage issue link types).
  • View system and custom avatars.
  • View user groups.
  • View user information in Jira that the user has access to, including usernames, email addresses, and avatars.