Terraform Provider version: atlassian/atlassian-operations 2.0.3
Affected resources:
Description:
When running terraform plan, the provider returns a 403 error when trying to read alert policies and notification policies:
Error: Client Error
Unable to read alert policy, status code: 403. Got response: {“errors”:[{“title”:“You are not authorized to see team details.”}]}
Error: Client Error
Unable to read notification policy, status code: 403. Got response:
{“errors”:[{“title”:“You are not authorized to see team details.”}]}
What is suspicious: The error message says “not authorized to see team details” — but we are trying to read a policy, not a team. This suggests the provider is making an internal team API call as part of reading the policy,
and that call is failing.
Account permissions:
What works fine with the same account:
What fails:
All of the above use the same team_id. The fact that escalations and routing rules work while policies do not — despite identical team permissions — strongly suggests this is a provider-side issue where the policy read
implementation triggers an additional team API call that is not necessary (or uses a different endpoint) compared to other resources.
Expected behavior: A Team Admin account that can view policies in the UI should be able to read them via the API/provider.
Sorry for the late response, I am unsure if you already found the solution for this.
This 403 error message usually indicates that the request being executed by the provider is hitting a Teams API endpoint internally. As you suspected, some endpoints resolve additional team metadata during the read operation.
Even if the user is a Team Admin in the UI, the API token may still lack the required scope for certain team-related endpoints. It’s worth confirming that the token is created by a user who has access to the team in JSM Operations (not just UI visibility).
I'd also suggest calling the API endpoints directly with the same token via curl or Postman). It's easier to spot the problem there.
I hope this sheds light.
Thanks for your response.
Our admin also created a support ticket and the Atlassian Team is currently working on the problem. It seems not to be a configuration problem but rather a problem introduced by the Terraform provider.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.