Unitlane logo Unitlane Governed Jira admin software
License Guard icon
SCIM and externally managed groups
License Guard

Externally Managed Groups in Atlassian Explained

Externally managed groups in Atlassian are groups whose membership is controlled outside Atlassian, usually through an identity provider and SCIM, so local admins should review what the group grants but route membership changes to the identity owner.

Written for Jira and Atlassian administrators. Reviewed against current Atlassian documentation and Unitlane product scope.

Direct answer

Externally managed groups in Atlassian are groups whose membership is controlled outside Atlassian, usually through an identity provider and SCIM, so local admins should review what the group grants but route membership changes to the identity owner.

Why this matters

Externally managed groups create a boundary between discovery and action. Jira admins may see that a group grants product access or project permissions, but the durable membership change may belong to the IdP owner.

For the query externally managed groups Atlassian, the useful answer should help an admin decide what to check now, which rows to hold out, and which proof should survive after the change. That is why this page stays inside a narrow operational boundary instead of becoming a general governance essay.

Working scenario

A group named Engineering-Jira-Users appears in Atlassian and grants Jira access. It is read-only because it syncs from the identity provider. The local admin can review its impact, but the identity team must approve and make membership changes.

Recognize the ownership boundary

If the group is synced or read-only, the local admin should not treat it like an ordinary Atlassian group. The review can explain impact, but the identity owner controls membership.

Review what the group grants

Externally managed does not mean irrelevant. The group may grant app access, admin privileges, or Jira project permissions. Before routing a case out, capture what the group actually affects.

Keep local default groups separate

A default Atlassian group can coexist with synced IdP groups. Cleanup gets confusing when admins treat both as the same source just because both appear on a user's profile.

Document the handoff

A useful route-out includes group name, source, access impact, user or population affected, requested decision, and the identity owner. That evidence makes the handoff actionable.

Review usage before group cleanup

If the group itself is being retired or replaced, inspect where it is referenced before deletion or rename. Externally managed membership is only one part of the risk.

Decision table

SignalWhat to verifyDecision or evidence
Group is read-only or syncedConfirm provisioning source and identity owner.Route membership changes to the IdP owner with access-impact evidence.
Group grants Jira product accessCheck app access settings and whether the group contributes to billable access.Review license impact and route membership change to the owner if synced.
Group appears in project permissionsTrace permission schemes, project roles, and global permissions where relevant.Use impact evidence before asking the identity owner to change membership or retire the group.
Group conflicts with a default or built-in group nameCheck naming, sync behavior, and Atlassian guidance on group conflicts.Resolve naming at the source of ownership rather than patching locally.
Group is being replacedConfirm old and new group usage before moving membership.Build a migration evidence pack and approve cleanup only after references are understood.

Common mistakes

Most cleanup errors happen when an admin treats a partial signal as a complete answer. These are the failure modes to watch for on this topic:

  • Trying to edit synced group membership locally.
  • Assuming externally managed groups cannot create license waste.
  • Ignoring where a synced group is used in Jira permissions.
  • Mixing default-group cleanup with IdP-group cleanup.
  • Routing a case to identity without evidence of what the group grants.

Checklist

  • Confirm whether the group is local or externally managed.
  • Identify the identity owner before requesting membership changes.
  • Review product access, admin access, and project references separately.
  • Check whether a local default group also grants access.
  • Preserve evidence when routing the change out of local admin work.
  • Review group usage before delete, rename, or replacement.

Official Atlassian references

Related reading

Continue inside the same intent cluster.

These links keep the reader inside the right topic instead of scattering them across unrelated product claims.

Product route

License Guard

Group Impact Audit helps with the review layer for Jira groups: exact read-only usage discovery, evidence export, baselines, and safer handoff before a group is changed. Unitlane is not a broad identity governance platform, IdP, SIEM, or policy engine; it does not replace the identity owner or make policy decisions for them. License Guard can support the adjacent billable-access review when the same group also affects product access and cleanup approval.