New in this release
- Support for the AWS GovCloud (US) Region (experimental)
Fixed in this release
- Exception on connector save when using a PostgreSQL backend
- Exception on add-on initialization when using a MySQL backend
To check known issues (or if you want to file one), view this app's issue tracker.
To learn more about the app, you should:
This is a supported app, so you may contact the vendor (or support contact) for help:
Federated AWS access for Atlassian users
Add long-term AWS security credentials (IAM users) once, configure AWS access for Atlassian groups with temporary credentials and fine grained permissions via IAM Policies thereafter (Identity Broker).
Single Sign-On (SSO) to the AWS Management Console
Access AWS resources directly via menu links and/or a configurable 'AWS Management Console Login' gadget.
REST API for temporary AWS Security Credentials
Expose AWS Connectors to requesting users with sufficient permissions and allow retrieval of temporary AWS security credentials based on such connectors (Token Vendor).
More details
+++ NOTE: This add-on is deprecated and superseded by Identity Federation for AWS (Jira) and Identity Federation for AWS (Bamboo) for technical reasons (existing customers are eligible for free cross upgrades). +++
Integrate AWS into your Jira and DevOps workflows (Identity Broker/Token Vendor):
New in this release
Fixed in this release
Release 1.2.0 adds configurable credentials expiration:
Release 1.1.0 adds a second principal type Account (IAM User) to expand the available integration scenarios, significantly improves Atlassian Design Guidelines (ADG) compliance and adds sample IAM Policies to ease getting started:
This is the initial release 1.0.0 - it provides configuration of AWS Connectors (map IAM users and policies to Atlassian groups), Single Sign-On (SSO) to the AWS Management Console via menu links and/or a configurable AWS Management Console Login Gadget and a REST API for temporary AWS credentials.