Atlassian's Model Context Protocol (MCP) makes it easier to bring Atlassian data and actions into AI tools through a consistent, server-side integration model. Until now, Atlassian Rovo MCP has supported only OAuth as its primary authentication mechanism, which means:
We're excited to share that authentication via API token access for Atlassian MCP is now supported — a new way to connect to MCP without an interactive consent screen, designed specifically for machine‑to‑machine and automated use cases.
Authentication via API token access lets MCP clients authenticate without an interactive user flow in a browser. Instead of redirecting to a consent page, your MCP client authenticates using personal API tokens via Basic Auth, and service account–style credentials for non-human workloads.
In practice, this enables you to:
Authentication via API token access is an additional authentication option alongside OAuth and does not replace OAuth. OAuth remains the best fit for end‑user, interactive scenarios.
Authentication via API token access unlocks new ways to use Atlassian MCP:
With this new authentication method, you'll have two ways to authenticate with Atlassian MCP:
This is the best option for end-user driven scenarios where interactive consent is acceptable. This method uses the standard OAuth 2.1 flow, requires a browser-based consent screen, and is ideal when a human user can approve access.
This is the preferred option for user-scoped automation from non-interactive environments. This method uses a personal API token created by the user and sent via HTTP Basic Auth in the Authorization header (Basic base64(email:api_token)). Tools run with the same permissions as the token owner.
Your MCP client connects to the Atlassian MCP server at:
https://mcp.atlassian.com/v1/mcp
The client includes an Authorization header using Basic Auth with your email and API token:
Authorization: Basic BASE64_ENCODED_EMAIL_AND_TOKEN
MCP tools execute with the permissions associated with that token, enabling access to Jira, Confluence, and other Atlassian apps as permitted.
This design lets us support non‑interactive clients while staying aligned with how Atlassian tokens are created, managed, and revoked today.
In our official documentation, we'll show how the MCP server, tokens, and Atlassian cloud services interact in more detail.
Here's a quick look at how you'll configure the new method in your MCP client once it's available.
You'll generate a personal API token from your Atlassian account security settings:
Create a base64‑encoded string from your email and API token in the format email:api_token:
# Format: base64(email:api_token)
echo -n "your.email@example.com:YOUR_API_TOKEN_HERE" | base64
Copy the output — this is what you'll use in your MCP configuration.
Here's an example mcp.json configuration using Basic Auth:
{
"mcpServers": {
"atlassian-rovo-mcp": {
"url": "https://mcp.atlassian.com/v1/mcp",
"headers": {
"Authorization": "Basic BASE64_ENCODED_EMAIL_AND_TOKEN"
}
}
}
}
Or
"atlassian-rovo-mcp": {
"command": "npx",
"args": [
"mcp-remote@latest",
"https://mcp.atlassian.com/v1/mcp",
"--header",
"Authorization: Basic BASE64_ENCODED_EMAIL_AND_TOKEN"
]
}
Replace BASE64_ENCODED_EMAIL_AND_TOKEN with the value you generated in the previous step.
This capability is off by default.
Because OAuth allowlists do not apply to agents using API tokens, an Org admin must explicitly enable this feature in order for api tokens to be honored.
If your agent is only discovering two tools, the most likely cause is an incorrectly encoded token
Your api token scopes are not added properly in case you didn't use Rovo MCP API Token, please review the scopes here https://support.atlassian.com/atlassian-rovo-mcp-server/docs/supported-tools/
https://mcp.atlassian.com/v1/mcpmcp-remote@latestNo domain allowlist validation via redirect URIs: Because there is no redirect URI, domain allowlist checks tied to redirects are bypassed; IP allowlist enforcement is enabled as a separate control and is supported for all authentication methods.
We're exploring support for product and cloudId filters so you can control which products and sites MCP tools can access when authentication via API token access is used.
Dilip Venkatesh
4 comments