Table of Contents | ||||||||
---|---|---|---|---|---|---|---|---|
|
Get Started
Related Documentation
Security
Administrators should be aware of security considerations especially who has access to view or modify the hook definition and the exposed passwords.
Tip | ||
---|---|---|
| ||
Any server instance supported by the Atlassian CLI can be accessed for running actions depending on having valid user credentials for the actions requested. This is the same as running the actions from a command line. |