Revoke user access to your organization
By the end of this lesson, you'll be able to:
- Suspend a user from your organization
- Remove a user from your organization
- Restrict access to your apps with IP allowlists
Suspend a user
Suspended users can remain suspended indefinitely until their access is restored or the user is removed.
- Go to admin.atlassian.com and select your organization.
- From the sidebar, expand Directory.
- Select Users section.
- Select a user to open their user page.
- Select the menu at the top right of the page then select Suspend access.
- The user’s access is immediately suspended.
Suspended users are listed with the Suspended status in the users list, in Atlassian Administration.
Users who are not suspended are active users, even if they don’t have any app access granted.
Remove a user
Removing a user from an organization will only remove them from that organization. If they are in other organizations, they still have access to those organizations.
- Go to admin.atlassian.com and select your organization.
- From the sidebar, expand Directory.
- Select the Users section.
- Select the user to open their user page.
- Select the menu at the top right of the page and then select Remove user.
- Take note of the warning message and select Remove user again.
- The user is removed. They can't access any app in your organization.
Limit access to trusted networks with IP allowlists
IP allowlisting is enforced per app and per site. It is available on Premium plans for Jira, Jira Service Management, Confluence, and Compass, on Enterprise plans for Atlassian Analytics, and require at least one of these plans to use IP allowlist controls with Rovo.
How does IP allowlisting work?
- Only traffic from allowed IP addresses or ranges can access your Atlassian Cloud apps and related APIs.
- Any attempts from non‑allowlisted IPs are blocked before login, even if the user has a valid account.
- Admin APIs, automation, and external integrations that call your app APIs must also originate from allowlisted IP addresses.
- Collect the public IP addresses or CIDR ranges your users connect from.
- Expand Security then Device security.
- Select IP allowlisting.
- Select Create IP allowlist.
- Provide a name relevant to the location or IP addresses you want to allow.
- Select Next.
- Select the apps that users can access from IP addresses or locations in the IP allowlist.
- Select Next.
- Choose between adding an IP address or a Location.
- Select a location or add IP addresses and ranges.
- Select Create IP allowlist.
- Test access by confirming that users on allowed networks can still sign in and that users on non-allowed networks are blocked.