I'm not sure what your question is about.
Two things are not clear:
- You seem to be reading a document that says something about JIRA making authentication requests, but what to? Could you tell us what document it is and what you're actually trying to do?
- You mention wbosm-hp and Fisheye/Crucible. These are two totally different systems, and I can't work out why you relate them (or even where wbosm-hp is relevant. Or what it even is, you need to explain that too)
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.