Following https://confluence.atlassian.com/display/KB/How+to+bypass+a+reverse+proxy+or+SSL+in+Application+Links, it seems the approach, creating a new connector for just application links is not secure; people could make requests against that port.
What is the recommendation for securing the new connector and only assure it will be used for application links, perhaps only from specified soures? Would it be to configured it to use SSL? Configure it to use a special truststore? And what would need to done to the 'other' application to assure the security of the transport layer?
When working with Application Links, it may be necessary to bypass any existing reverse proxy or SSL configuration, without disrupting normal usage for your instances. You may also wish to use this process to bypass a proxy during the troubleshooting process.
Since SSL is used to cryptograph a connection, we encourage the users to use that always as they can. The documentation you've mentioned as you can see mention that you should use HTTP for tests purposes or in case you are facing some specific issue related to SSL and Application Links.
You can force JIRA to only accept HTTPS connections. Please check this link on step 5:
Well, actually you cannot. But here a workaround that could work: Add a firewall rule allowing only the communication on HTTP protocol only among the applications address which are using the application links. Not sure if this will work, but definitely isn't elegant.
We're looking for participants for a workshop at Atlassian! We need Jira admins who have interesting custom workflows, issue views, or boards. Think you have a story to sha...
Connect with like-minded Atlassian users at free events near you!Find a group
Connect with like-minded Atlassian users at free events near you!
Unfortunately there are no AUG chapters near you at the moment.Start an AUG
You're one step closer to meeting fellow Atlassian users at your local meet up. Learn more about AUGs