Integrating JIRA and Confluence
JIRA applications and Confluence complement each other. Collect your team's thoughts, plans and knowledge in Confluence, track your issues in your JIRA application, and let the two applications work together to help you get your job done.
Here's some ways you can get JIRA and Confluence working together.
On this page:
Installing JIRA and Confluence together
We recommend running JIRA and Confluence in separate stand-alone instances behind an Apache Web Server. The following documentation will guide you through the installation processes:
- Installing Confluence
- Installing JIRA applications
- Running Confluence behind Apache
- Integrating JIRA with Apache
We don't support deploying Confluence and any other application (including JIRA) in the same Tomcat container. See Can Multiple Atlassian Products Be Deployed in a Single Tomcat Container? for more information.
Use JIRA and Confluence together
This is the fun stuff. Check out Use JIRA applications and Confluence together to find out about all the integration points, great time saving features, and to check exactly which JIRA application and version you'll need.
Delegate user management to JIRA
If you already have a JIRA application you can choose to delegate user management to JIRA, and manage all your users in one place. You can control which JIRA groups also have permissions to use Confluence. Your license tiers for each application do not need to be the same.
See Configuring JIRA Integration in the Setup Wizard to delegate user management to JIRA when installing Confluence for the first time.
See Connecting to Crowd or JIRA for User Management to delegate user management to JIRA for an existing Confluence site.
Connect JIRA and Confluence with an application link
See Linking to Another Application to find out how to connect Confluence to your JIRA application using an application link. This only needs to be done once.
If you delegated user management to JIRA as part of Confluence's setup process, an application link to JIRA (using Trusted Applications authentication) will be all set up and ready to go.
You can choose to change the authentication to OAuth for additional security. See Configuring authentication for an application link to find out about changing the authentication to OAuth for additional security.
Was this helpful?
Thanks for your feedback!