Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

Updates to handling sensitive data and terminology in Automation

Hi community!

Thanks to feedback from users like you, we're making some important changes to how Automation handles "hidden" fields, those sensitive values like API keys or tokens that you mask during rule configuration.

We've also got an update for some terminology changes making their way across the platform.

Keeping your sensitive data secure in Automation

We've received reports (shout out to those who raised AUTO-2211 and AUTO-2207!) that sensitive values were appearing in clear text when using the Automation Rule Management API. We're taking action to ensure these values are consistently redacted across all surfaces to keep your data secure.

What's changing

Over the next 7 days, we're rolling out a fix to address the gaps identified in our REST API and export tools. We're ensuring that hidden field values are:

  • Always redacted in API responses — addressing the feedback in AUTO-2211, you'll now see a placeholder instead of the plain-text value

  • Excluded from rule exports (both single and bulk)

On re-import, hidden fields will be blank and must be re-entered manually.

Here's an example of what a looks like in an API response:

"headers": [
{
"id": "_header_1777502480005",
"name": "token",
"value": "**************************",
"headerSecure": true
}
]

 Which components are affected

The fix covers components where hidden fields weren't being fully enforced:

  • Incoming Webhook

  • Send Web Request

  • Slack

  • Twilio

  • Microsoft Teams

  • Send custom Docusign request

  • Send custom Entra ID request

  • Send custom Okta request

  • Send custom Workday request

Components that use Atlassian's outbound auth (OAuth connections) are not affected, those credentials are never stored in rule configuration.

A quick note on backups

If you use rule exports as a backup mechanism, exports will not include hidden field values, this has always been the intended behaviour, but we want to make sure it's clear. If you ever need to restore from an export, you'll need to re-enter any sensitive values manually. We recommend storing those keys securely outside of Atlassian (for example, in a password manager).

When is this happening?

We're also working on a broader fix to apply the hidden field pattern consistently across all components that handle sensitive values — including Generic Request actions used with Workday, Okta, Microsoft, Entra, and DocuSign. As part of a single rollout, existing components will have sensitive fields removed over the next 7 days, and support will extend to these additional components over the next 14 days.

We’re also updating automation vocabulary!

“Rules” are now called “flows”, and “components” are now called “steps”.

With automation expanding across Atlassian, we’ve updated these terms to align with other experiences. Everything you’ve built still works the same.

Questions or feedback?

How are you using these components today? If you have a specific workflow that relies on rule exports, or you have questions about how this change affects your setup. Let us know in the comments. We're here to help.

If you believe you've been impacted by the regression, please reach out to Atlassian Support.

1 comment

Josh
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Champions.
May 1, 2026

This is excellent news. Thank you, @Scott Bell !

Comment

Log in or Sign up to comment
TAGS
AUG Leaders

Atlassian Community Events