Learn about Atlassian organizations
New to administering Atlassian cloud products? Learn about Atlassian organizations and what it means to be an organization admin.
Every tunnel has a unique ID. An attacker would need to know this ID to make calls to the tunnel.
We also use the following security restrictions:
The calls coming through the tunnel must be made from within Atlassian Cloud. Any other traffic isn’t accepted by a tunnel.
The configured AuthN / AuthZ mechanism on the self-managed side
Was this helpful?