Hello there!

Need Help? We are right here!

miniOrange Email Support
success

Thanks for your Enquiry.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

Atlassian Bitbucket Cloud Provisioning and Deprovisioning



Atlassian Bitbucket Cloud SCIM Provisioning allows to create account in a simplified way and link Atlassian Bitbucket Cloud users' account to their existing or new apps. Atlassian Bitbucket Cloud Provisioning automates user provisioning with their identities.

Provisioning saves time when setting up new users and teams, and also manages access privileges through the user lifecycle. miniOrange can create, read, and update user accounts for new or existing users, remove accounts for deactivated users, and synchronize attributes across multiple user stores.

Atlassian Bitbucket Cloud SCIM User provisioning and deprovisioning actions are bi-directional, so you can create accounts inside an external application and import them into miniOrange, or alternatively create the accounts in miniOrange and then push them out to any linked external applications.

Atlassian Bitbucket Cloud SCIM Deprovisioning means deleting a user and removing their access from multiple applications and network systems at once. Deprovisioning action is triggered when an employee leaves a company or changes roles within the organization. The deprovisioning features increase your organization's security profile by removing access to sensitive applications and content from people who leave your organization.


Provisioning & Deprovisioning Scenarios


miniOrange provides Provisioning solutions for all scenarios of user management (provisioning), which includes AD Integration, LDAP Integration and automated provisioning for all External Applications such as Atlassian Bitbucket Cloud, Google Workspace, Workday, etc



Prerequisites

    There are a couple of things you need to do before you can provision external users into your sites and products:

  • Get the user provisioning functionality for your identity provider.
  • Make sure you're an admin for an Atlassian organization. See Organization administration.
  • Verify one or more or your domains in your organization. See Domain verification.
  • Subscribe to Atlassian Access from your organization. See Atlassian Access security policies and features.
  • Make sure you're an admin for at least one Bitbucket site that you want to grant synced users access to.

Follow the step-by-step guide given below to setup Atlassian Bitbucket Provisioning

1. Configure Provisioning in Atlassian Bitbucket Cloud

  • Login to your organization at admin.atlassian.com, click Directory and then User provisioning.
  • Click Create a directory.
  • Atlassian Bitbucket Cloud SCIM Provisioning: User Provisioning

  • Enter a name to identify the user directory, for example miniOrange users, then click Create.
  • Atlassian Bitbucket Cloud SCIM Provisioning : Create Directory

  • Copy the values for Directory base URL and API key. You'll need those for your identity provider configuration later in miniOrange dashboard.

    Note: Make sure you store these values in a safe place, as these are not shown again.
  • Atlassian Bitbucket Cloud SCIM Provisioning : API Key.

  • You'll now add Bitbucket sites to your organization so that provisioned users can be granted access to the products. See the user provisioning page for more details about why you want to add a site to your organization.
    From the User provisioning page, click Add a site, select the site you want to add (e.g. example.atlassian.net), and follow the on-screen instructions.
  • Atlassian Bitbucket Cloud SCIM Provisioning

  • Note: To Configure product access for the provisioned groups and users:

    To grant product access to any newly provisioned users, set up product access for existing groups.

    • From the site (example.atlassian.net) you added in the previous step, go to Product access and find the Bitbucket section.
    • Click Add group and select or enter the name of the synchronized group.
    • Click Add groups to finish giving the group product access.
      You'll see a success flag that confirms the group is configured for product access. To learn more about configuring product access, see Update product access settings.
    • Do not make a synced group from your identity provider a default group. This may cause collisions when attempting to add users to the product that are not managed via SCIM.

2. Configure SCIM for Atlassian Bitbucket Cloud in miniOrange

  • If you are using any external IDP and just want to enable provisioning through us:
    • Go to Apps >> Provisioning >> Create a SCIM 2.0 App for Atlassian Bitbucket Cloud.
    • Atlassian Bitbucket Cloud SCIM Provisioning Select Provisioning

      Atlassian Bitbucket Cloud SCIM Provisioning Configuration

    • In Custom Application Name, enter Atlassian Bitbucket Cloud or any other name of your choice.
    • In SCIM Base URL field, enter Directory base URL and in Bearer Token field, enter API key that you copied in the Step 1.

  • If you want to enable SAML authentication + SCIM both:
    • Go to Apps >> SAML >> Atlassian Bitbucket Cloud.
    • Create SAML app

      Select Atlassian Bitbucket Cloud app

    • In the Provisioning section, enter the SCIM Base URL and Bearer Token that you copied in the Step 1. In SCIM Base URL field, enter Directory base URL and in Bearer Token field, enter API key.
    • Atlassian Bitbucket Cloud Provisioning configuration

    • In Enable Provisioning Features, you can enable any feature below.
    • Enable Atlassian Bitbucket Cloud Provisioning Features

    • Click on Save button.

3. Create Group

  • Go to Groups > Create Group. Enter the Group Name and click on Create Group button and the group will be created.
  • atlassian-bitbucket-cloud provisioning create group

4. Add Policy

  • In the Policies section, navigate to Add Policy tab.
  • In Select Application section, select the application you have created in step2.
  • In Configure Settings section, select the group you have created in step4 and enter the policy name with the required login method.
  • Click on Save button.
  • Atlassian Bitbucket Cloud Provisioning Add policy

5. Add Users

  • Go to Users > Add User.
  • Enter the Users Details and the user will be created.
  • Atlassian Bitbucket Cloud Provisioning Add User

6. Assign Users

  • Go to Groups.
  • Assign the users to the Group you have created in step4.
  • atlassian-bitbucket-cloud provisioning assign users

7. Update Users

  • To update user profile, Go to Users >> User List.
  • Select a particular user and in Actions dropdown select Edit.
  • atlassian-bitbucket-cloud Provisioning Select Edit User

  • Fill out user updated information and click on Save button.
  • atlassian-bitbucket-cloud Provisioning Edit User

8. Delete Users

  • To delete user, Go to Users >> User List.
  • Select a particular user and in Actions dropdown select Delete.
  • atlassian-bitbucket-cloud Provisioning Select Delete User

  • A pop up will appear in which click on Yes button.
  • atlassian-bitbucket-cloud Provisioning Delete User



View Provisioning Reports

How to access Provisioning Reports?

  • Navigate to the Reports in the left-hand navigation pane and select Provisioning Report.
  • Provisioning Report

  • Filter the reports by specifying Enduser Identifier and Application Name criteria. Additionally, choose the desired timespan for the reports. Once done, click on the Search.
  • Search Provisioning Report

  • Alternatively, you can directly click on Search to retrieve all provisioning reports based on time without applying any specific filters.


External References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products