Internal
Create a new instance of the service.
Returns all permissions, including:
This operation can be accessed anonymously.
Permissions required: None.
Returned if the request is successful.
example:
{
"permissions": {
"BULK_CHANGE": {
"description": "Ability to modify a collection of issues at once. For example, resolve multiple issues in one step.",
"key": "BULK_CHANGE",
"name": "Bulk Change",
"type": "GLOBAL"
}
}
}
Returns:
If no account ID is provided, the operation returns details for the logged in user.
Note that:
globalPermissions
, projectPermissions
,
projectPermissions.projects
, and projectPermissions.issues
are ignored.projectPermissions.permissions
are ignored.Deprecation notice: The required OAuth 2.0 scopes will be updated on June 15, 2024.
read:jira-work
read:permission:jira
This operation can be accessed anonymously.
Permissions required: Administer Jira global permission to check the permissions for other users, otherwise none. However, Connect apps can make a call from the app server to the product to obtain permission details for any user, without admin permission. This Connect app ability doesn't apply to calls made using AP.request() in a browser.
Details of the permissions to check.
Returned if the request is successful.
example:
{
"globalPermissions": [
"ADMINISTER"
],
"projectPermissions": [
{
"issues": [
10010,
10013,
10014
],
"permission": "EDIT_ISSUES",
"projects": [
10001
]
}
]
}
Returns a list of permissions indicating which permissions the user has. Details of the user's permissions can be obtained in a global, project, issue or comment context.
The user is reported as having a project permission:
commentId
is provided whose
permissions
does not equal BROWSE_PROJECTS, a 400 error will be returned.This means that users may be shown as having an issue permission (such as EDIT_ISSUES) in the global context or a project context but may not have the permission for any or all issues. For example, if Reporters have the EDIT_ISSUES permission a user would be shown as having this permission in the global context or the context of a project, because any user can be a reporter. However, if they are not the user who reported the issue queried they would not have EDIT_ISSUES permission for that issue.
For Jira Service Management project permissions, this will be evaluated similarly to a user in the customer portal. For example, if the BROWSE_PROJECTS permission is granted to Service Project Customer - Portal Access, any users with access to the customer portal will have the BROWSE_PROJECTS permission.
Global permissions are unaffected by context.
This operation can be accessed anonymously.
Permissions required: None.
Optional
commentThe ID of the comment.
Optional
issueThe ID of the issue.
Optional
issueThe key of the issue. Ignored if issueId
is provided.
Optional
permissions?: stringA list of permission keys. (Required) This parameter accepts a comma-separated list. To get the list of available permissions, use Get all permissions.
Optional
projectOptional
projectThe ID of project.
Optional
projectThe key of project. Ignored if projectId
is provided.
Optional
projectReturned if the request is successful.
example:
{
"permissions": {
"EDIT_ISSUES": {
"description": "Ability to edit issues.",
"havePermission": true,
"id": "12",
"key": "EDIT_ISSUES",
"name": "Edit Issues",
"type": "PROJECT"
}
}
}
Returns all the projects where the user is granted a list of project permissions.
This operation can be accessed anonymously.
Permissions required: None.
Returned if the request is successful.
Protected
Static
initialize
This resource represents permissions. Use it to obtain details of all permissions and determine whether the user has certain permissions.
See
https://developer.atlassian.com/cloud/jira/platform/rest/v3/api-group-permissions