Skip to Content

Say hi ๐Ÿ‘‹๐Ÿผ to "Atlassian Service Accounts"

One of the most impactful updates to the Atlassian Cloud platform in recent months just arrived - and it solves a problem many admins have quietly dealt with for years.

Atlassian has introduced Service Accounts for Cloud, and while the feature seems technical at first glance, it directly addresses a critical compliance issue buried deep in the fine print of the Atlassian Customer Agreement.


โš ๏ธ The Problem: Shared Credentials Are Prohibited

According to the agreement (Section 2.1):

โ€œUser accounts are granted to individual, named persons and may not be shared.โ€

โ€œYou must ensure that all Authorized Users keep their user IDs and passwords [...] strictly confidential.โ€

Despite this, many teams have historically:

  • Used โ€œbotโ€ accounts for automation
  • Shared passwords or API tokens across team members
  • Scripted REST API actions (e.g. ticket creation, page updates) using credentials from a human user

While convenient, these patterns violated Atlassianโ€™s terms and created governance blind spots - until now.

โœ… The Solution: Atlassian Service Accounts

With the launch of Atlassian Service Accounts, you can now create dedicated, non-human technical identities - designed specifically for automation, scripting, and system-level integrations.

What makes a service account different?

  • ๐Ÿ” Not tied to a person - it's a separate identity with no human user
  • ๐Ÿ“ง Distinct email format: xyz@serviceaccount.atlassian.com
  • โš™๏ธ UI-based API token generation for secure REST access
  • ๐Ÿ“‹ Assignable product access (e.g. Jira, Confluence) - just like normal users
  • ๐Ÿงพ Compliant with Atlassianโ€™s license terms and audit policies

โš™๏ธ Use Cases: Where Service Accounts Shine

Scenario

Old Way (Problematic)

New Way (Compliant)

Scripted Jira ticket creation

Shared personal token

Service account with API token

CI/CD integration with Confluence

Fake user with SSO bypass

Bot user with scoped product access

Automation rules in Forge

Human user context

Dedicated service identity

Data sync with external DBs

Generic โ€œadminโ€ login

Named service account, full audit trail

๐Ÿ”„ Familiar for Data Center Users

If you're migrating from Atlassian Data Center, you're likely used to managing service accounts locally. Atlassian Cloud lacked an official equivalent - forcing workarounds with fake users. Now, you can implement the same best practices in Cloud, with tighter controls and better UI.

๐Ÿง  Key Benefits

  • Security: No more shared credentials or tokens floating around
  • Governance: Know exactly which automation is doing what, and when
  • Clarity: Separate bot actions from real user activity in audit logs
  • Simplicity: Configure and generate tokens directly from the Atlassian Admin UI

๐Ÿš€ How to Get Started

  1. Go to Atlassian Admin โ†’ Directory โ†’ Service Accounts
  2. Create a new account and give it a clear name (e.g. jira-automation)
  3. Choose which product(s) it should access (Jira, Confluence, etc.)
  4. Generate a personal access token from the UI
  5. Use the token in your scripts, integrations, or automation tools

๐Ÿ”’ You can revoke tokens, deactivate accounts, or manage scopes just like any other user - but with full control and isolation.

๐Ÿงฉ ONETEEM Recommendation

We strongly recommend auditing your current automation and integration setups:

  • Are you using shared user credentials?
  • Do any bots or scripts authenticate using real user accounts?
  • Are you assigning licenses to fake human identities?

If yes - now is the time to switch. Atlassian Service Accounts are secure, compliant, and purpose-built for modern teams.

Need help restructuring your automation setup?

ONETEEM supports teams transitioning to Atlassian Cloud with secure user management, automation best practices, and Forge-based custom integrations.

๐Ÿ“ฉ Contact us today to streamline your platform while staying compliant.

โ€‹

Danke fรผr die Registrierung!

โ€‹

โ€‹