Configuring Jira Cloud connections - Amazon Glue
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Configuring Jira Cloud connections

Jira Cloud supports the AUTHORIZATION_CODE grant type for OAuth2.

  • This grant type is considered "three-legged" OAuth as it relies on redirecting users to a third-party authorization server to authenticate the user. It is used when creating connections via the Amazon Glue console. The Amazon Glue console will redirect the user to Jira Cloud where the user must login and allow Amazon Glue the requested permissions to access their Jira Cloud instance.

  • Users may still opt to create their own connected app in Jira Cloud and provide their own client ID and client secret when creating connections through the Amazon Glue console. In this scenario, they will still be redirected to Jira Cloud to login and authorize Amazon Glue to access their resources.

  • This grant type results in a refresh token and access token. The access token is short lived, and may be refreshed automatically without user interaction using the refresh token.

  • For public Jira Cloud documentation on creating a connected app for Authorization Code OAuth flow, see Enabling OAuth 2.0 (3LO).

To configure a Jira Cloud connection:

  1. In Amazon Secrets Manager, create a secret with the following details:

    1. For the customer managed connected app, the Secret should contain the connected app Consumer Secret with USER_MANAGED_CLIENT_APPLICATION_CLIENT_SECRET as key.

    2. Note: You must create a secret for the connection in Amazon Glue.

  2. In the Amazon Glue Data Catalog, create a connection by following the steps below:

    1. When selecting a Connection type, select Jira Cloud.

    2. Provide the Jira Cloud environment.

    3. Select the Amazon IAM role which Amazon Glue can assume and has permissions for following actions:

      { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "secretsmanager:DescribeSecret", "secretsmanager:GetSecretValue", "secretsmanager:PutSecretValue", "ec2:CreateNetworkInterface", "ec2:DescribeNetworkInterface", "ec2:DeleteNetworkInterface", ], "Resource": "*" } ] }
    4. Select the secretName which you want to use for this connection in Amazon Glue to put the tokens.

    5. Select the network options if you want to use your network.

  3. Grant the IAM role associated with your Amazon Glue job permission to read secretName.

  4. In your Amazon Glue job configuration, provide connectionName as an Additional network connection.