Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This guide details the user permissions and roles within the Assets and & Inventory Plugin. Assigning the appropriate roles ensures users have the necessary access to manage assets effectively.

Assigning User Permissionsuser permissions

To configure permissions, navigate to Assets > Settings > App Permissions.

...

User permissions within the Assets and & Inventory Plugin can be assigned to:

  • All logged-in users: This grants full access to any user who logs into your Jira instance. Use with caution!

  • Users defined in a group: This allows you to assign specific permissions to a pre-defined Jira group. This is a recommended approach for granular access control.

  • Users with Jira admin role: By default, Jira administrators have full access to the plugin.

Note

If you do not configure the "App Administrator", any logged-in user will be an app administrator.

The following table outlines the available permissions and their corresponding access levels:

Permission

Option

Description

Asset administrator

Grants full control over all functionalities within the Assets

and

& Inventory Plugin.

Only app administrators can:

  • Create, edit, and delete asset type schemes and attributes

  • Move asset types

Import and Export access  

Permission to user Import and Export module.

Report access

Permission to view and generate reports within the plugin.

Asset app menu access

Permission to access the Assets app menu within Jira.

Jira admin overrides see and manage assets permission configurations

Disabling this switch prevents Jira admins from seeing all assets by default. While this configuration uses permission schemes for access control, Jira admins, by virtue of their administrative privileges, can still enable the switch. It's important to note that any configuration changes are logged and can be traced through Audit Logs.

...

Tip

Our recommendations:

  • Define a clear access control strategy for your organization based on user needs and security best practices.

  • Regularly review and update user permissions to ensure they remain aligned with evolving roles and responsibilities.