Currently Targetprocess integration with Jira is based on webhooks, change notification mechanism. As the data flows across the systems, usually over the public network, security is a crucial aspect.
The webhooks sent from Jira are plain http calls requiring an open endpoint on the receiver side by default. Although Atlassian introduced Secure webhooks for Jira Cloud recently (see: https://developer.atlassian.com/cloud/jira/platform/webhooks/#secure-admin-webhooks) such improvements are not expected for Jira DC.
Apptio Open Token for Jira Data Center
Considering the lack of Jira DC webhooks security, Apptio provides a way to authenticate incoming traffic via Apptio Open Token. The mechanism is based on generating temporary token based on API keys (see: https://help.apptio.com/en-us/frontdoor/admin-guide/eaa-api/overview-api-keys-faq.html)
Setting up Targetprocess secured endpoint
Enabling Apptio Open Token authentication causes rejecting incoming webhooks without valid token in ‘apptio-opentoken’ header. To configure the authentication, execute the following steps:
- Open Targetprocess settings:
- Go to “Integrations” section:
- Select your profile
- Scroll to “Set up webhook in Jira” section
- Set “Apptio Open Token” as an authentication type
- Press “Save” button.
Enhancing Jira DC webhooks with Apptio Open Token
Jira DC does not provide any out-of-the-box mechanism to extend outgoing webhooks with custom header. Therefore, you have to add your own mechanism providing Apptio Open Token.
One of the possibilities is to create proxy service with a following algorithm:
- Catch outgoing webhooks
- Obtain Apptio Open Token (see: https://help.apptio.com/en-us/frontdoor/admin-guide/eaa-api/api-curl-sample-commands.html) using your API key.
- Add ‘apptio-opentoken’ header with the obtained token to the webhook.
- Forward the webhook to Targetprocess endpoint
Still have a question?
We're here to help! Just contact our friendly support team.