Zilla Access Request for Jira Service Management
- Jira Service Management
Provide application access, approvals and fulfillment workflows from Zilla Security to your Jira Service Management request portal
Request Application and Permission Access
Using the request portal form, users request access to your enterprise applications and permissions. Available applications and permissions are dynamically retrieved from your Zilla Security deployment.
Configure Applications and Workflows
Enable requestable applications and select default approval and fulfillment workflows in your Zilla Security deployment. This will dynamically provide assignments and updates to your request portal and workflows.
View Summary of Access Requests
View a summary of application and permission access requests, who the access was requested for, assigned approvers, potential violation info, Jira ticket status and corresponding request ticket.
Connect your Zilla Security instance with your Jira Service Management request portal for users to make requests for enterprise applications and permissions. Automatically detect potential policy violations, dynamically assign business approvals and route the ticket to the assignee to fulfill approved access - Zilla automates provisioning where available. Zilla keeps the request ticket automatically updated. Once the Zilla Access Request for JSM app has been installed and configured with your Zilla Security instance, you can enable specific forms to include your enterprise applications and permissions for users to start making requests for.
Zilla makes identity and security simple. We’ve combined comprehensive identity and access governance, and cloud security in a single SaaS platform providing automated visibility into who has access to what, and provide the tools to automate reviews and remediate inappropriate access and security.
E-Mail Zilla Support: firstname.lastname@example.org
Privacy and security
Zilla Access Request for Jira Service Management integrates with your Atlassian product. This remote service can:
- View email addresses of users
- Act on a user's behalf, even when the user is offline
- Write data to the host application
- Read data from the host application
Configure when individual permissions can be requests and associated fulfillment methods - manual or automatically provisioned.