Following https://confluence.atlassian.com/display/KB/How+to+bypass+a+reverse+proxy+or+SSL+in+Application+Links, it seems the approach, creating a new connector for just application links is not secure; people could make requests against that port.
What is the recommendation for securing the new connector and only assure it will be used for application links, perhaps only from specified soures? Would it be to configured it to use SSL? Configure it to use a special truststore? And what would need to done to the 'other' application to assure the security of the transport layer?
When working with Application Links, it may be necessary to bypass any existing reverse proxy or SSL configuration, without disrupting normal usage for your instances. You may also wish to use this process to bypass a proxy during the troubleshooting process.
Since SSL is used to cryptograph a connection, we encourage the users to use that always as they can. The documentation you've mentioned as you can see mention that you should use HTTP for tests purposes or in case you are facing some specific issue related to SSL and Application Links.
You can force JIRA to only accept HTTPS connections. Please check this link on step 5:
Well, actually you cannot. But here a workaround that could work: Add a firewall rule allowing only the communication on HTTP protocol only among the applications address which are using the application links. Not sure if this will work, but definitely isn't elegant.
Hi Community! My name is Amir and I’m on the Jira Service Desk product marketing team at Atlassian. Our team would love to understand how you’re leveraging our ecosystem for Jira Service Desk. Wha...
Connect with like-minded Atlassian users at free events near you!Find a group
Connect with like-minded Atlassian users at free events near you!
Unfortunately there are no AUG chapters near you at the moment.Start an AUG