Developer
Get Support
Sign in
Get Support
Sign in
DOCUMENTATION
Cloud
Data Center
Resources
Sign in
Sign in
DOCUMENTATION
Cloud
Data Center
Resources
Sign in
Last updated Jan 14, 2026

Authorization for Id Mapping

In order to prevent abuse, you must authenticate yourself before you can use the Id Mapping APIs. This page explains the authorization process required to access the migration API endpoints.

Migration API Authorization

Basic Authentication

The migration API uses basic authentication for secure access to Id Mapping endpoints.

  • Learn more: Basic auth for REST APIs
  • Username: The email address of your Atlassian Cloud account
  • Password: Your cloud API token
  • Required permissions: Site or org admin permissions on the destination cloud site

Setting Up Cloud Authentication

  1. Verify admin access: Ensure your account has site or org admin permissions on the destination cloud site
  2. Generate API token: Learn how to create an API token
  3. Use credentials: Your email as username and API token as password

Example Authentication Header

1
2
# Basic auth with email and API token
Authorization: Basic <base64-encoded-email:api-token>

# Example with curl
curl -X POST \
  https://api.atlassian.com/migrations/reports/v1/id-mappings/trigger \
  -H "Authorization: Basic $(echo -n 'user@example.com:your-api-token' | base64)" \
  -H "Content-Type: application/json"

Security Best Practices

For Cloud API Tokens

  1. Rotate regularly: Change your API tokens periodically
  2. Limit scope: Use tokens with minimal required permissions
  3. Store securely: Never commit tokens to code repositories
  4. Monitor usage: Review API token usage in your Atlassian account

For Server/DC Access

  1. Use dedicated service accounts: Create specific accounts for API access
  2. Enable 2FA: Use two-factor authentication where possible
  3. Regular audits: Review and rotate credentials regularly
  4. Network security: Ensure secure network connections (HTTPS/SSL)

Common Authentication Issues

401 Unauthorized

Possible causes:

  • Incorrect email or API token
  • Expired API token
  • Account lacks required permissions

Solutions:

  • Verify your email and regenerate API token
  • Confirm admin permissions on the cloud site
  • Check token hasn't been revoked

403 Forbidden

Possible causes:

  • Account lacks site/org admin permissions
  • API token has insufficient scope
  • IP restrictions or security policies

Solutions:

  • Request admin permissions from site administrator
  • Verify API token permissions
  • Check network and security configurations

Testing Your Authentication

You can test your authentication setup using a simple API call:

1
2
# Test authentication with status endpoint
curl -X GET \
  "https://api.atlassian.com/migrations/reports/v1/id-mappings/test-job-id" \
  -H "Authorization: Basic $(echo -n 'your-email@example.com:your-api-token' | base64)" \
  -H "Content-Type: application/json"

# Expected response for invalid job ID (but valid auth):
# {"status": 404, "errorMessage": "Job not found..."}

# If auth is invalid, you'll get:
# {"status": 401, "errorMessage": "Unauthorized"}

Next Steps

Once you have proper authorization configured:

Rate this page: