Skip to main content

Data import

General settings

General settings

Connection details

Connection details
ParameterValue
Base URL{Base URL}
Authentication typeNone
Headers{"Request":{"Authorization":"Bearer {Your API key}","Accept":"application/json"}}
Test connectionSelect the checkbox

Queries and mappings

Users - Accounts

Parameters:

TabParameterValue
GeneralURLUsers
GeneralCollectionResources
GeneralDistinctNo
GeneralEnabledCheck the box
AdvancedHTTP verbGET
AdvancedURL is a DynamicExpresso expressionNo
PagingChange pagingNo

Mappings:

DestinationOperatorSource
Business keyMapid
Unique IDMapid
Account NameMapuserName
Display NameExpressionname_givenName + " " + name_familyName
CategoryConstantUser
StatusExpressionactive ? "Active" : "Deactivated"
Valid fromMapmeta_created
Distinguished nameMapid
EmailMapemails_value
Job titleMaptitle
Cell phoneMapphoneNumbers_value
AtlassianAccountIdMapurnscimschemasextensionatlassianexternal10_atlassianAccountId

Groups – Resources

Parameters:

TabParameterValue
GeneralURLGroups
GeneralCollectionResources
GeneralDistinctNo
GeneralEnabledSelect the checkbox
AdvancedHTTP verbGET
AdvancedURL is a DynamicExpresso expressionNo
PagingChanging pagingNo

Mappings:

DestinationOperatorSource
Business keyExpressionid
Security resource business keyExpressionid
NameMapdisplayName
CategoryConstantGroup
TypeConstantAtlassian Guard Groups 2
Display nameMapdisplayName
Short nameMapid
DescriptionMapid

Groups - Assignments

Parameters:

TabParameterValue
GeneralURLGroups
GeneralCollectionResources
GeneralDistinctNo
GeneralEnabledCheck the box
AdvancedHTTP verbGET
AdvancedURL is a DynamicExpresso expressionNo
PagingChanging pagingNo

Mappings:

DestinationOperatorSource
Resource business keyMapid
Account – business keyMapmembers_value

Advanced configuration

Advanced configuration
ParameterValue
Paging mechanismNone
Timeout in seconds3600
Row count per batch100000

Account rules

The Omada Atlassian Guard connectivity has the following Account rules:

Ownership rule: The account owner is set to the identity where the Email value of the identity matches the Name value of the account.

FieldValue
TypeIdentity lookup
Join reasonExact Match
Account attributeAccount UID
Identity attributeIdentity’s unique ID

Classification rule: If an identity with the account attribute Identity join reason equals Exact Match, the account type is set to Email.

FieldValue
Account typePersonal
Scope attributeIdentity join reason
Scope operatorEquals
Scope valueExact Match

Additional configuration

Enable the Always provision changes option for the Atlassian Guard Groups 2 resource type. It allows sending every detected change to that resource (or its assignments), even if the target system is already in the desired state.

  1. Go to Setup > Resource types and open the Atlassian Guard Groups 2.
  2. Enable the Always provision changes option. Click OK.
  3. Click Apply.