Jira Service Management

🚧

Important

This integration is available for purchase through the Atlassian Marketplace. Search for BeyondTrust Privileged Remote Access Integration for Jira to find and purchase the app.

Overview

The BeyondTrust Privileged Remote Access (PRA) - Jira Service Management integration allows organizations to streamline their privileged access workflows by enabling technicians to launch secure remote sessions directly from Jira tickets, automatically import session data back into Jira, and enforce change management approval processes.

Key Features

FeatureDescription
Jump to AssetsTechnicians can launch BeyondTrust access sessions from within Jira tickets using BeyondTrust Jump Technology, connecting to assets associated with tickets.
Session Data ImportBeyondTrust access session data is automatically written back to Jira tickets after session completion, including file transfers, system information, session notes, recordings, and chat messages.
Change Management Endpoint ApprovalBeyondTrust PRA can be configured to require ticket validation before allowing access to Jump Items, verifying that the ticket exists, is assigned to the requesting user, and is associated with the target asset.
Custom LinksAccess Jira tickets directly from the BeyondTrust Access Console for quick context and reference.
Configurable Event FilteringControl which session events are imported into Jira to match your documentation requirements.

Architecture

The integration is implemented as a Forge app written in JavaScript that:

  • Provides a custom user interface within Jira for launching Jump sessions to assets associated with tickets
  • Validates endpoint approval requests from PRA when change management workflows are enabled, checking ticket status, assignee match, and asset association
  • Receives webhook notifications from PRA when access sessions end
  • Imports session data into Jira tickets, including detailed event information and session recordings
  • Communicates with PRA via OAuth-authenticated API calls

Integration Flow

  1. Technician opens a Jira ticket with an associated asset
  2. Technician clicks Jump to Asset with BeyondTrust PRA
  3. App generates a session request to PRA
  4. PRA opens connection to the asset (via web console or download)
  5. When session ends, PRA sends webhook to Jira
  6. Session details are imported and displayed in the Jira ticket

Prerequisites

Before installing and configuring the integration, ensure you have:

  • BeyondTrust PRA appliance (B Series physical or virtual) with administrative access
  • Network connectivity from the PRA appliance to Jira Service Management over HTTPS (TCP 443)
  • Administrative access to the /login interface for configuration
  • At least one configured Jump Item for testing

Installation Steps

12

Step 1: Install the Jira App

Install the BeyondTrust Privileged Remote Access app by navigating to your Jira Apps marketplace, searching for the app, and completing the installation prompts.

For more information, see Install the Jira app

Step 1: Install the Jira app

Steps
  1. Navigate to your Jira instance
  2. Go to Apps >Find new apps (or Manage apps)
  3. Search for "BeyondTrust Privileged Remote Access"
  4. Click Install and follow the prompts
  5. Wait for the installation to complete

Step 2: Configure Asset Association Field

Steps

The integration requires a field in your Jira issues to associate tickets with assets. This can be either:

  • An Asset field that links to assets from the Jira Assets module
  • A custom text field where asset names are manually entered

Option A: Using Jira Assets Field

If you are using Jira Service Management with the Assets module:

  1. Navigate to Project settings > Issue types
  2. Select the issue types you want to use with this integration (e.g., Incident, Service Request)
  3. On the issue type, click Fields
  4. Add or ensure an Assets field is present
  5. Note the field name for configuration (typically something like "Assets" or "Configuration Items")

Option B: Using Custom Text Field

If you prefer to use a simple text field:

  1. Navigate to Project settings > Fields
  2. Click Create field or follow Atlassian's documentation
  3. Create a field with the following properties:
    • Field Type: Short text (single line) or Assets
    • Name: Asset Name (or your preferred name)
    • Description: Name of the asset to connect via BeyondTrust PRA
  4. Associate the field with appropriate screens and issue types
  5. Note the field name for later configuration

Configuration

Configure BeyondTrust Privileged Remote Access

All steps in this section take place in the BeyondTrust /login administrative interface. Access your BeyondTrust interface by going to the hostname of your B Series Appliance followed by /login (e.g., https://support.example.com/login).

12345

Step 1: Verify API is Enabled

The integration requires the BeyondTrust XML API to be enabled.

For more information, see Verify API is Enabled

Step 1: Verify API is Enabled

Steps
  1. In /login, navigate to Management > API Configuration
  2. Verify that Enable XML API is checked
  3. If not enabled, check the box and click Save

Step 2: Create an OAuth API Account

Steps
  1. In /login, navigate to Management > API Configuration
  2. Click Add
  3. Configure the following settings:
    • Enabled: āœ… Check to enable
    • Name: Jira Integration API (or your preferred name)
    • OAuth Client ID: This will be auto-generated; save this for Jira configuration
    • OAuth Client Secret: This will be auto-generated; save this for Jira configuration
  4. Under Permissions, check the following:
    • Command API: Full Access
    • Reporting API: Allow Access to Access Session Reports and Recordings
  5. Click Save at the top of the page
ā„¹ļø

Keep the OAuth Client ID and OAuth Client Secret secure. You need these values when configuring the Jira app.

Step 3: Add Outbound Events

Steps
  1. In /login, navigate to Management > Outbound Events
  2. Click Add
  3. Configure the following settings:
    • Name: Jira Session End (or your preferred name)
    • URL: This will be provided in the Jira app configuration page (see Configure the Jira app )
    • Events to Send: āœ… Check Access Session End
    • Enabled: āœ… Check to enable
  4. Click Save

Step 4: Set Up Custom Link (Optional)

Steps
  1. In /login, navigate to Console Settings > Custom Links
  2. Click Add
  3. Configure the link:
  4. Click Save

Step 5: Set Up Change Management Workflow (Optional)

Steps
  1. In /login, navigate to Jump > Jump Policies
  2. Under Ticket System, configure the following:
    • Ticket System URL: This is provided in the Jira app configuration page (see Configure the Jira app )
    • CA Certificate: Upload the CA certificate from your Jira instance (typically not required for Atlassian Cloud)
    • User Prompt: Enter a prompt such as "Enter your Jira ticket ID to proceed"
  3. Click Save
  4. Under the Jump Policies section, click Add to create a new policy, or click Edit next to an existing policy
  5. Configure the Jump Policy:
    • Name: Enter a descriptive name (e.g., "Jira Approval Required")
    • Under Ticket System, check Require a ticket ID before a session starts
    • Configure other policy settings as needed for your environment
  6. Click Save
ā„¹ļø

The Jump Item must be configured to use this Jump Policy for the change management workflow to be enforced. The policy should be applied to Jump Items or Jump Groups that require approval.

Configure the Jira App

Access the app configuration via Apps > Manage Apps > BeyondTrust Privileged Remote Access

Required Settings
SettingDescriptionExample
Enable IntegrationMaster switch to enable/disable the integrationāœ… Enabled
Host NamePRA appliance hostname (without protocol)pra.yourcompany.com
Client IDOAuth Client ID from PRA API account(from PRA API configuration)
Client SecretOAuth Client Secret from PRA API account(from PRA API configuration)
Asset Field NameName of the Jira field containing asset informationAssets, Asset Name, Configuration Items
Optional Settings
SettingDescriptionExample
Use Web Rep Console for Jump ToOpen sessions in browser tab instead of downloading session fileāœ… Enabled (recommended)
Auto Associate With UserUpdate ticket assignee to match primary session representative)āŒ Disabled
Events to ExcludeSelect which session event types should NOT be imported into Jira(none by default)
Integration URLs

After configuring the basic settings and clicking Save, the app will display two important URLs:

  • Outbound Event URL: Use this in PRA's Outbound Events configuration (Step 3 in PRA configuration)
  • Endpoint Approval URL: Use this as the Ticket System URL in PRA's Jump Policies (Step 6 in PRA configuration)
Configuration Validation

The app automatically validates the configuration when you click Save and display:

  • āœ… Configuration Valid: All settings are correct and PRA is accessible
  • āŒ Configuration Invalid: There is an error in the configuration; check the error message and verify:
    • Host Name is correct and accessible
    • Client ID and Client Secret are correct
    • PRA appliance is accessible from Jira over HTTPS

Complete PRA Configuration

Now that you have the URLs from Jira, return to PRA to complete the configuration:

Update Outbound Event URL
  1. In PRA /login, navigate to Management > Outbound Events
  2. Click Edit on the Jira Session End event you created earlier
  3. Set the URL to the Outbound Event URL from the Jira app configuration page
  4. Click Save
Update Endpoint Approval URL (if using change management)
  1. In PRA /login, navigate to Jump > Jump Policies
  2. Under Ticket System, set the Ticket System URL to the Endpoint Approval URL from the Jira app configuration page
  3. Click Save

Use Cases

Organizations using Jira Service Management can integrate with BeyondTrust PRA to provide secure privileged access to critical assets from within Jira, satisfy internal and external compliance requirements with comprehensive audit trails, and integrate with change management processes.

Jump to Asset from Jira Ticket

Technicians can leverage BeyondTrust Jump Technology to access an asset associated with a ticket directly from the ticket interface.

Workflow
  1. Technician opens a Jira ticket (incident, service request, etc.)
  2. The ticket has an asset associated via the configured asset field
  3. Technician clicks the "…" menu (more actions) at the top right
  4. Selects Jump to Asset with BeyondTrust PRA
  5. A dialog appears with session information and a Jump to... link
  6. If Use Web Rep Console is enabled:
    • Clicking the link opens a new browser tab to the PRA web console
    • The session automatically connects to the asset
  7. If Use Web Rep Console is disabled:
    • A session file is downloaded
    • Opening the file launches the PRA Access Console
  8. When the session ends, session data is automatically imported into the Jira ticket

Import Session Data into Jira

Once the BeyondTrust access session ends, Jira is automatically updated with information gathered during the session.

Imported Session Data includes:

  • Session Details: Start time, end time, duration, session ID
  • User Information: Representative(s) involved, customer information
  • System Information: Hostname, operating system, IP addresses
  • File Transfers: List of files transferred during the session, with sizes and directions
  • Chat Messages: All chat messages exchanged during the session
  • Session Notes: Any notes added by representatives
  • Session Recordings: Links to session recordings in PRA (if enabled)
  • Session Events: Configurable list of events that occurred during the session

Change Management Endpoint Approval

BeyondTrust access requests can require a Jira ticket ID to be entered as part of the access request process. When enabled, the integration validates the ticket before allowing access.

Workflow
  1. User opens the PRA Access Console
  2. User attempts to connect to a Jump Item that requires ticket validation
  3. PRA prompts: "Enter your Jira ticket ID to proceed" (or your custom prompt)
  4. User enters a Jira ticket ID (e.g., "SD-1234")
  5. PRA sends an approval request to Jira with:
    • Ticket ID
    • User information (email, display name, username)
    • Target asset name (computer name)
  6. The Jira app validates:
    • āœ… Ticket Exists: The specified ticket ID is valid
    • āœ… Ticket Active: The ticket is not in a closed/resolved/cancelled state
    • āœ… User Authorized: The requesting user matches the ticket's assignee (by email or name)
    • āœ… Asset Match (optional): The target asset name matches the ticket's associated asset
  7. If all validations pass:
    • Approval is sent to PRA
    • Session proceeds normally
    • The ticket ID is linked to the session
    • Session data is imported to the ticket when complete
  8. If any validation fails:
    • Denial is sent to PRA with a specific error message
    • Session is blocked
    • User sees the error message explaining why access was denied
Validation Details

The endpoint approval process performs the following checks:

  • Ticket Lookup: Searches for the ticket by ticket ID (e.g., "SD-1234")
  • Assignee Validation: Matches the PRA user against the Jira ticket assignee using:
    • Email address match
    • Display name match (private or public)
    • Username match
  • Asset Validation: Compares the PRA Jump Item computer name with the asset name from the ticket (case-insensitive)
Common Denial Reasons
  • "The specified ticket, [SD-1234], could not be found. Please provide a valid ticket number."
  • "The specified ticket, [SD-1234], is not assigned to anyone."
  • "The user that initiated the PRA session does not match the assignee of ticket [SD-1234]."
  • "The specified ticket, [SD-1234], does not appear to be associated with an asset named [WORKSTATION-01]."

Access Jira Tickets from Access Console

Using BeyondTrust's custom link functionality, users can access the associated Jira ticket directly from within the Access Console. This saves time searching for the record in Jira and provides the user with any available session details, history, or other context to help resolve issues quickly.

Steps
  1. Open the PRA Access Console
  2. View an active or completed session that has a linked Jira ticket
  3. Click the View Jira Ticket custom link (or whatever name you configured)
  4. The Jira ticket opens in your default browser

Workflow Examples

  1. Customer reports an issue
  2. Support technician creates a Jira ticket and assigns it to themselves
  3. Technician adds the customer's asset to the ticket's asset field
  4. Technician clicks Jump to Asset with BeyondTrust PRA
  5. Session launches in browser or via downloaded console
  6. Technician resolves the issue during the session
  7. Technician adds notes and ends the session
  8. Session data automatically appears in the Jira ticket
  9. Technician reviews the imported data and closes the ticket

Troubleshooting

Common Issues

Issues
Issue Symptoms Resolution
App configuration validation fails
  • Configuration shows as invalid after saving
  • Error message appears in the configuration page
  • Verify the Host Name is correct (no https://, just the hostname)
  • Confirm the Client ID and Client Secret match the PRA OAuth API account
  • Ensure the PRA appliance is accessible from the internet (Jira Cloud → PRA)
  • Check that the OAuth API account in PRA has the correct permissions
  • Verify the PRA API is enabled (Management > API Configuration > Enable XML API)
Jump to Asset button not appearing
  • Jump to Asset option not visible in ticket menu
  • Unable to launch sessions from Jira
  • Verify the integration is enabled in the app configuration
  • Ensure the ticket has an asset associated via the configured asset field
  • Check that the asset field name in the app configuration matches the actual field name in Jira
  • Verify the user has appropriate permissions to view and use the app
  • Try refreshing the browser cache (Ctrl+F5)
Sessions not importing into Jira
  • Sessions complete successfully but data doesn't appear in Jira
  • No session information in ticket activity
  • Verify the Outbound Event URL in PRA matches the URL from the Jira app
  • Check that the outbound event is enabled in PRA
  • Ensure the ticket has a custom field value for External Key set to the Jira ticket ID
  • Review PRA logs (Management > Outbound Events) for delivery errors
  • Verify network connectivity from PRA to Jira (HTTPS to *.atlassian.net)
  • Check the Jira app logs (if accessible) for errors during import
Endpoint approval always denies access
  • All approval requests are denied even with valid ticket
  • Error message appears in PRA console
  • Verify the Endpoint Approval URL in PRA Jump Policies matches the URL from the Jira app
  • Ensure the ticket exists and is not closed/resolved/cancelled
  • Check that the ticket is assigned to the user attempting access
  • Verify user identity matches between PRA and Jira:
    • Email addresses match
    • Display names match
    • If using LDAP/SSO, ensure username mapping is consistent
  • If asset validation is enabled, ensure the Jump Item computer name matches the ticket's asset name exactly
  • Review the detailed error message returned by the integration for specific failure reason
  • Check Jira app logs for detailed validation failure information
Wrong Asset field configured
  • Asset validation fails even when assets appear correct
  • Jump to Asset doesn't find the asset
  • Verify the Asset Field Name in the app configuration matches the actual field name in Jira exactly (case-sensitive)
  • For custom fields, use the field name (not the field ID)
  • For Assets fields, use the display name of the field as it appears in Jira
  • If unsure, check the issue layout configuration to see the exact field name
Custom link doesn't work
  • Custom link appears in Access Console but doesn't navigate to Jira
  • Link shows error or 404
  • Verify the custom link URL is correct: https://your-instance.atlassian.net/browse/%SESSION.CUSTOM.EXTERNAL_KEY%
  • Ensure the session has the External Key custom field populated
  • Check that the Jira ticket ID is valid and accessible
  • Verify the user has permission to view the ticket in Jira

Logging and Diagnostics

  • Outbound Event Logs: Management > Outbound Events - Check the status column for delivery failures
  • API Access Logs: Check for incoming API calls from Jira
  • System Logs: Review general system logs for errors related to the integration

Testing the Integration

  1. Create a test ticket in Jira
  2. Assign the ticket to your user account
  3. Add a known Jump Item asset to the ticket's asset field
  4. Click the "…" menu and select Jump to Asset with BeyondTrust PRA
  5. Verify the session launches successfully
  6. Perform a simple action (e.g., view a file, send a chat message)
  7. End the session
  8. Wait 1-2 minutes
  9. Refresh the Jira ticket
  10. Verify session data appears in the ticket activity

Support

For additional support:

  1. Review this documentation thoroughly
  2. Check the app logs in Jira for specific error messages
  3. Contact BeyondTrust support with:
    • Product version information (PRA and Jira app versions)
    • Detailed description of the issue
    • Configuration screenshots (with sensitive data redacted)
    • Specific error messages
    • Timestamps and affected ticket/session IDs

Best Practices

  • Test in Development First: Install and configure the integration in a Jira test/sandbox environment before production deployment
  • Pilot Program: Start with a small group of users and gradually expand
  • Document Customizations: Maintain documentation of any custom configurations specific to your environment
  • Training: Provide training to support technicians on the new workflow

©2003-2026 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.