Set up app permissions

This page is about Assets & Inventory Plugin for Jira DC. Using Cloud? Click here.

This guide details the user permissions and roles within the Assets and Inventory Plugin. Assigning the appropriate roles ensures users have the necessary access to manage assets effectively.

Assigning user permissions

To configure permissions, navigate to Assets > Settings > App Permissions.

Screenshot 2024-04-19 at 17.46.24.png

User permissions within the Assets and Inventory Plugin can be assigned to:

  • All logged-in users: This grants full access to any user who logs into your Jira instance. Use with caution!

  • Users defined in a group: This allows you to assign specific permissions to a pre-defined Jira group. This is a recommended approach for granular access control.

  • Users with Jira admin role: By default, Jira administrators have full access to the plugin.

If you do not configure the App Administrator, any logged-in user will be an app administrator.

The following table outlines the available permissions and their corresponding access levels:

Permission

Description

Permission

Description

Asset administrator

Grants full control over all functionalities within the Assets and Inventory Plugin.

Only app administrators can:

  • Create, edit, and delete asset type schemes and attributes

  • Move asset types

Import and Export access  

Permission to user Import and Export module.

Report access

Permission to view and generate reports within the plugin.

Asset app menu access

Permission to access the Assets app menu within Jira.

Jira admin overrides see and manage assets permission configurations

Disabling this switch prevents Jira admins from seeing all assets by default. While this configuration uses permission schemes for access control, Jira admins, by virtue of their administrative privileges, can still enable the switch. It's important to note that any configuration changes are logged and can be traced through Audit Logs.

Additional considerations

  • Define a clear access control strategy for your organization based on user needs and security best practices.

  • Regularly review and update user permissions to ensure they remain aligned with evolving roles and responsibilities.