Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

alert_policy & notification_policy return 403 error in terraform pipeline

Sandra Herlufsen
I'm New Here
I'm New Here
Those new to the Atlassian Community have posted less than three times. Give them a warm welcome!
March 4, 2026

Terraform Provider version: atlassian/atlassian-operations 2.0.3

Affected resources:

  • atlassian-operations_alert_policy
  • atlassian-operations_notification_policy

Description:

When running terraform plan, the provider returns a 403 error when trying to read alert policies and notification policies:

Error: Client Error
Unable to read alert policy, status code: 403. Got response: {“errors”:[{“title”:“You are not authorized to see team details.”}]}

Error: Client Error
Unable to read notification policy, status code: 403. Got response:
{“errors”:[{“title”:“You are not authorized to see team details.”}]}

What is suspicious: The error message says “not authorized to see team details” — but we are trying to read a policy, not a team. This suggests the provider is making an internal team API call as part of reading the policy,
and that call is failing.

Account permissions:

  • The account used for the API token (email_address) has Team Admin role in JSM Operations
  • The same account can see and access all policies in the browser UI without any issues

What works fine with the same account:

  • atlassian-operations_team :white_check_mark:
  • atlassian-operations_schedule :white_check_mark:
  • atlassian-operations_escalation :white_check_mark:
  • atlassian-operations_routing_rule :white_check_mark:
  • atlassian-operations_api_integration :white_check_mark:
  • atlassian-operations_integration_action :white_check_mark:

What fails:

  • atlassian-operations_alert_policy :cross_mark: 403
  • atlassian-operations_notification_policy :cross_mark: 403

All of the above use the same team_id. The fact that escalations and routing rules work while policies do not — despite identical team permissions — strongly suggests this is a provider-side issue where the policy read
implementation triggers an additional team API call that is not necessary (or uses a different endpoint) compared to other resources.

Expected behavior: A Team Admin account that can view policies in the UI should be able to read them via the API/provider.

0 answers

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
CLOUD
PRODUCT PLAN
ENTERPRISE
TAGS
AUG Leaders

Atlassian Community Events