There is a concern that a Jira user with elevated permissions, like a Jira admin, having access to and using the Atlassian MCP server, creates a risk. In short, we'd like a standard Jira user to be able to use the MCP server, but in some instances, block or prevent a user with elevated Jira permissions from using it. Is that possible?
Welcome to the community.
Going over the documentation, I think not.
https://support.atlassian.com/rovo/docs/getting-started-with-the-atlassian-remote-mcp-server/
Within the article, there is a feedback suggestion option, provide your concern there.
But the same applies to the API and elevated user has more permissions than a normal user, this can't be denied to Jria admins as well.
In my opinion people with elevated rights should no the risks based on the elevated permissions they have.
And if it could be limited admins can't use the option, thant wold be strange, not?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Please accept my answer as a solution, if my answer helped to solve your request.
This will help other community member trying to solve the same.
P.S. If the answer is very valuable to you, please share some kudos.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi @Matt Deimler,
I understand the security concern, but as @Marc -Devoteam- mentioned, this would be quite unusual from an access control perspective. Here's why this restriction isn't typically possible:
Technical Reality:
Alternative Approaches:
Recommendation: Focus on governance rather than technical restrictions. Establish clear policies about when/how admins should use MCP, with regular access reviews and monitoring.
The feedback option Marc mentioned is definitely worth using - Atlassian might consider adding granular MCP access controls in future releases.
What specific risk scenario are you trying to prevent? That might help identify better mitigation strategies.
Feel free to DM me if you want to discuss specific security architectures!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Yes, administrative IAM typically conveys a higher level of trust to the end-user. However, this extends that same layer of trust to an AI system to interpret user prompts and MCP to execute implementation, both of which can make mistakes; as applied to an organization administrator, that's terrifying.
In this sense, technical restrictions are the governance. Access reviews and monitoring aren't meaningfully helpful to prevent the kind of damage AI/MCP interactions can cause. I'm not worried about the admins themselves.
There are only two solutions I can think of:
It would be great to have better options to limit user access (including privileged users) to atlassian mcp; considering what it's capable of, I'm surprised there doesn't appear to be more of this baked in. Let me know if I'm overlooking anything in the setup instructions, but as it is; it looks like once called, anyone in the org can oauth into it assuming the app itself is approved.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.