Information Technology Reference
In-Depth Information
Authentication
option
Description
This option is chosen if the linked applications have the same set of users, for example, if you are using LDAP or Atlassian
Crowd for user management and both applications fully trust each other. With this option, users will not be required to go
through an initial authorization process.
Trusted Ap-
plications
While using trusted applications, user A from JIRA will access the target application as user A, matched via the username.
This option is chosen if the linked applications do not have the same set of users, for example, if each application maintains
its own user repository.
OAuth
With this option, users will need to go through an initial authorization process before JIRA is able to access data from the
target application.
If you are running JIRA 6.1 or newer, there is a new 2-legged OAuth option.
This is the simplest authentication type, where you specify a user for JIRA to use while accessing data from the target ap-
plication. The access permission will be purely based on the specified user account.
Basic Access
Search WWH ::




Custom Search