Secure Fields

Secure Fields in every modern organization protects sensitive data that require special security measures. Whether we are talking about salary information in the HR system, license keys, or other confidential information, we want access to be granted only to authorized users.

Secure Fields is a tool that enables the creation of secure fields and the definition of detailed permission schemes. This allows us to effectively exclude unauthorized access and protect sensitive data not only in the user interface but also in the context of exports and APIs.

With Secure Fields, you have the ability to effectively manage risk while also meeting regulatory requirements related to personal data protection. This approach not only protects your valuable assets but also creates a conducive environment for development and innovation within the company, where everyone feels safe sharing information.

Investing in data security is an investment in the future of the business, enabling it to succeed in a dynamically changing market environment.

Benefits

Employ Top Protection

Lets you hide sensitive data plain sight, and protect it from unauthorized exports or REST API calls.

Hide Any Data

Gives you secure equivalents of almost all available Custom Fields.

Protect Your Search

Secure your search as well – thanks to App optimization the searcher is only a little bit slower than the non-secure one.

Secure Fields Features

Create Secure Fields


To secure data in a task field, create new fields. Fields add equivalents for nearly all standard fields to the system, including:

  • Data Picker
  • Date Time Picker
  • Long Text Field (Free Text – multi-line)
  • Short Text Field (Short Text – single line)
  • Select List
  • Multi Select List
  • Number
  • Single User Picker
  • Multi User Picker
  • Group Picker
  • Multi Group Picker
  • Version
  • Component

Simple and Efficient Permission Management


The ability to define who can read, modify, or view the history of the field values. Additionally, a Jira Administrator can configure the permission scheme in the same way they assign access permissions to projects. This eliminates the need to configure access settings for each field individually, saving admin time and allowing for more efficient work.

Secure Searching, JQL Inegration, and Dashboard Gadgets


Secure Fields allow for the selection of one of three levels of search security, depending on the administrator’s priorities.

  • Level One focuses on search speed. Although searchers cannot see the value of a specific field, they can determine whether this value is greater or less than what they are searching for, which may pose issues, for example, in the case of salaries.
  • Level Two restricts searching by JQL, preventing unauthorized users from comparing data values while not excessively slowing down the system.
  • Level Three completely prevents searching fields.

You can search and save the query as SFC filters. Use the results of the SFC filters as JQL filters in the built-in Jira dashboard gadgets or dedicated Secure Fields gadgets.

Examples of Use

Personal Data Management

  • Secure Fields allows for the creation of fields to store personal employee data, such as email addresses, phone numbers, or financial information. This enables organizations to comply with data protection regulations, such as GDPR, minimizing the risk of unauthorized access.

Protection of Financial Information

  • In many companies, information regarding salaries, bonuses, and budget data is particularly sensitive. Secure Fields allows for controlling access to this data, ensuring that only authorized individuals can view or edit it.

Managing Access to Project Information

  • In the context of project management, Secure Fields can be used to hide sensitive project details, such as license keys or strategic development plans. With these safeguards in place, organizations can better protect their resources and ideas from competitors.

Security During API Integration

  • Secure Fields not only protects data in the user interface but also safeguards it during exports and API integrations, which is crucial for companies utilizing automation and integrations with other systems.

Customizing Permissions

  • By defining specific permission schemes, organizations can flexibly tailor access to sensitive data based on the user’s role within the company. This allows for more detailed management of data security.

Learn More About Secure Fields

Want to test Secure Fields? Visit the Atlassian Marketplace and take advantage of a free 30-day trial!

Available for Server, Data Center, and Cloud versions.

Atlassian Partner, Almarise, implementing atlassian tools

25 Global Companies That Trust Us

almarise client_1 implementing atlassian tools
almarise client_2 implementing atlassian tools
almarise client_3 implementing atlassian tools
almarise client_4 implementing atlassian tools
almarise client_5 implementing atlassian tools
almarise_client_6 implementing atlassian tools
almarise_client_7 implementing atlassian tools
almarise_client_8 implementing atlassian tools
almarise_client_9 implementing atlassian tools
almarise_client_10 implementing atlassian tools
almarise_client_11 implementing atlassian tools
almarise_client_12 implementing atlassian tools
almarise_client_13 implementing atlassian tools
almarise_client_14 implementing atlassian tools
almarise_client_15 implementing atlassian tools
almarise client
almarise client
almarise client
almarise client
almarise client