{"id":13088,"date":"2025-02-10T13:43:24","date_gmt":"2025-02-10T12:43:24","guid":{"rendered":"https:\/\/devsite.almarise.com\/?p=13088"},"modified":"2025-02-11T16:40:32","modified_gmt":"2025-02-11T15:40:32","slug":"how-to-safely-story-passwords-in-jira-secure-fields","status":"publish","type":"post","link":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/","title":{"rendered":"How to Safely Store Passwords in Jira? Practical Application of Secure Fields"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Managing access to IT resources is a key challenge for many companies. In an ideal world,<br \/>\nall systems should be integrated with a central Identity and Access Management (IAM) system, ensuring unified and secure access. However, reality is often more complex, and using IAM<br \/>\nis not always an option. This is where the Secure Fields app for Jira comes in, enabling the secure storage and access control of sensitive information, such as storing passwords in Jira.<br \/>\nIn this article, we will present a practical scenario where Secure Fields solves a real organizational problem. Find out how to safaly store passwords in Jira with Secure Fields app.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2067\" height=\"1272\" alt=\"safety of passwords jira\" title=\"obraz (15)\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\" class=\"img-responsive wp-image-13023\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-200x123.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-400x246.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-600x369.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-800x492.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-1200x738.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png 2067w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">When does password sharing become necessary?<\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p>Companies have various IT resources with restricted and protected access. These can include applications, physical or virtual servers, and other IT services. Examples of such resources include web servers, virtual and physical machines, mail servers, or network drives. Typically, secure access to these resources is managed using an Identity and Access Management (IAM) system, which allows for centralized credential management. However, in some cases, using such a central system may be impossible or inefficient.<\/p>\n<p>Here are three examples of such situations:<\/p>\n<p><span data-contrast=\"none\">1\ufe0f\u20e3 <strong data-start=\"571\" data-end=\"616\">The system does not support user accounts<\/strong><br data-start=\"616\" data-end=\"619\" \/>Some IT systems operate with a single shared password for all users, making<br \/>\n<\/span><\/p>\n<p><span data-contrast=\"none\">it impossible <\/span><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">to integrate them with centralized identity management.<\/span><\/p>\n<p><span data-contrast=\"none\">2\ufe0f\u20e3 <strong data-start=\"772\" data-end=\"802\">Immediate access is needed<\/strong><br data-start=\"802\" data-end=\"805\" \/>The process of creating a new user account in a system can be time-consuming,<br \/>\n<\/span><\/p>\n<p><span data-contrast=\"none\">especially if it requires administrator approval.<\/span><\/p>\n<p><span data-contrast=\"none\">3\ufe0f\u20e3 <strong data-start=\"940\" data-end=\"960\">Emergency access<\/strong><br data-start=\"960\" data-end=\"963\" \/>Even with centralized access management, emergencies can occur. For example, if the only person responsible for access suddenly becomes unavailable, the company may lose control<br \/>\nover a critical resource.<\/span><\/p>\n<p><span data-contrast=\"none\">4\ufe0f\u20e3 <strong data-start=\"1174\" data-end=\"1229\">A technical account not linked to a specific person<\/strong><br data-start=\"1229\" data-end=\"1232\" \/>A technical account is shared among different individuals, so multiple people need access<br \/>\nto its credentials.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">How does Secure Fields work in Jira?<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>Jira can be effectively used for IT resource management by creating projects and issues,<br \/>\nwhere each issue is assigned to a specific resource. <span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">In such a system, key information about<br \/>\n<\/span><\/p>\n<p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">each resource can be stored, including:<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{'335552541':1,'335559683':0,'335559684':-2,'335559685':720,'335559991':360,'469769226':'Symbol','469769242':&#091;8226&#093;,'469777803':'left','469777804':'\uf0b7','469777815':'hybridMultilevel'}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-ccp-props=\"{'134233117':false,'134233118':false,'335557856':16777215,'335559738':0,'335559739':0}\"><b>Resource name <\/b><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{'335552541':1,'335559683':0,'335559684':-2,'335559685':720,'335559991':360,'469769226':'Symbol','469769242':&#091;8226&#093;,'469777803':'left','469777804':'\uf0b7','469777815':'hybridMultilevel'}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b>Description of its function<\/b><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{'335552541':1,'335559683':0,'335559684':-2,'335559685':720,'335559991':360,'469769226':'Symbol','469769242':&#091;8226&#093;,'469777803':'left','469777804':'\uf0b7','469777815':'hybridMultilevel'}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b>Access addresses<\/b> \u2013 e.g., IP addresses or URLs<\/li>\n<\/ul>\n<p>Storing sensitive data, such as passwords or credentials, in Jira requires proper security measures to prevent potential security breaches. This is where the <b>Secure Fields<\/b> app comes in, ensuring the secure storage of such information, restricting access to unauthorized users, monitoring access, and providing full auditability to comply with best security practices.<\/p>\n<p><span data-contrast=\"none\">\ud83d\udee1\ufe0f <strong data-start=\"774\" data-end=\"793\">Data Encryption<\/strong> \u2013 Due to the high sensitivity of password data, it is encrypted<br \/>\n<\/span><\/p>\n<p><span data-contrast=\"none\">in the database using AES-256 encryption. This ensures that even if someone gains access<br \/>\n<\/span><\/p>\n<p><span data-contrast=\"none\">to the database, they cannot read the stored password.<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83d\udd12<strong data-start=\"1012\" data-end=\"1038\">Permissions Management<\/strong> \u2013 Secure Fields guarantees maximum security for stored passwords and access credentials in Jira. Only authorized users can view the stored password, while unauthorized users are completely restricted from access.<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83d\udc65 <strong data-start=\"1258\" data-end=\"1277\">Access Auditing<\/strong> \u2013 Every access attempt to a secure field\u2014both successful and unsuccessful &#8211; is logged in the Secure Fields history, ensuring full visibility of who attempted to decrypt the value. Additionally, users may be required to provide a reason for accessing the data.<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83c\udd94 <strong data-start=\"1546\" data-end=\"1575\">Additional Authentication<\/strong> \u2013 Administrators can enforce <strong data-start=\"1605\" data-end=\"1629\">extra authentication<\/strong> for users trying to view or modify a field\u2019s value. This is an effective measure to prevent unauthorized access, such as in cases of physical access to a Jira user\u2019s computer.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Practical Application \u2013 Step by Step<\/h2><\/div><div class=\"fusion-text fusion-text-4\"><p>To better illustrate how Secure Fields works, below we present several screenshots that show each step of the process.<\/p>\n<p>1\ufe0f\u20e3 <b>Additional authorization<\/b> \u2013 when attempting to access a field, the user must go through<br \/>\nan additional verification step.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1221\" height=\"596\" alt=\"secure passwords\" title=\"image (7)\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7.png\" class=\"img-responsive wp-image-13067\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-200x98.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-400x195.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-600x293.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-800x390.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-1200x586.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7.png 1221w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-5\"><p>2\ufe0f\u20e3 <span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\"><b>The Secure Password field view in a Jira issue<\/b><\/span><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\"> \u2013 this is how the field storing the password securely appears.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1350\" height=\"587\" alt=\"secure passwords\" title=\"image (8)\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8.png\" class=\"img-responsive wp-image-13065\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-200x87.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-400x174.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-600x261.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-800x348.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-1200x522.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8.png 1350w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-6\"><p>3\ufe0f\u20e3<b>Access history<\/b> \u2013 every attempt to view the field value is logged and accessible only<br \/>\nto authorized users.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1060\" height=\"402\" title=\"image (9)\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9.png\" alt class=\"img-responsive wp-image-13063\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-200x76.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-400x152.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-600x228.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-800x303.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9.png 1060w\" sizes=\"(max-width: 640px) 100vw, 1060px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-7\"><p>4\ufe0f\u20e3 <span style=\"color: var(--awb-text-color); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\"><strong>Authorization confirmation<\/strong> \u2013 th<\/span><span style=\"text-align: var(--awb-content-alignment);\">e user must conf<\/span><span style=\"color: var(--awb-text-color); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">irm why they want to access the field.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"1435\" height=\"647\" title=\"image (10)\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10.png\" alt class=\"img-responsive wp-image-13061\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-200x90.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-400x180.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-600x271.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-800x361.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-1200x541.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10.png 1435w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-8\"><p>&nbsp;<\/p>\n<p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">5\ufe0f\u20e3 <\/span><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\"><b>Permissions scheme<\/b><\/span><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\"> \u2013 shows that only users with the appropriate permissions can view<br \/>\nand edit the Secure Password field.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"1253\" height=\"594\" title=\"image (11)\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11.png\" alt class=\"img-responsive wp-image-13059\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-200x95.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-400x190.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-600x284.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-800x379.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-1200x569.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11.png 1253w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Secure Your Passwords with Secure Fields in Jira<\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p>Secure Fields offers a powerful solution for organizations needing to securely store sensitive data in Jira. With encryption, additional authentication, comprehensive access history,<br \/>\nand a flexible permissions system, the app ensures secure management of credentials.<br \/>\nIf your company aims to improve access security in Jira, visit the <a href=\"https:\/\/marketplace.atlassian.com\/apps\/1212681\/secure-fields-data-security-privacy?tab=overview&amp;hosting=cloud\">Atlassian Marketplace<\/a><br \/>\nand download Secure Fields for Jira today. Discover how it addresses the challenge of securely storing and controlling access to passwords.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-color:#f2f2f2;--awb-bg-color-hover:#f2f2f2;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><span style=\"color: #3f3d52;\"><span style=\"color: #666666;\"><b style=\"font-size: 22px; color: #3f3d52;\" data-fusion-font=\"true\">BEST PRACTICES FOR CREATING PASSWORDS<\/b><\/span><\/span><\/span><\/p>\n<p>An important aspect of password management is avoiding the use of the same password across multiple platforms. Each account should have a unique, hard-to-guess password, which significantly increases security. In practice, when dealing with many passwords across different systems, remembering them can become challenging.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-size:18px;--awb-item-padding-top:16px;--awb-item-padding-right:16px;--awb-item-padding-bottom:16px;--awb-item-padding-left:16px;--awb-odd-row-bgcolor:#3f3d54;--awb-even-row-bgcolor:#a1e2a3;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#5db038;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p style=\"color: #ffffff;\"><b>Use Unique Passwords<\/b> \u2013 Each account should have a separate, hard-to-guess password. Avoid reusing the same passwords across different systems to reduce the risk of them being compromised.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong data-start=\"0\" data-end=\"22\">Use Long Passwords<\/strong> \u2013 A long password (at least 12-16 characters) is harder to crack. The more characters, the more possible combinations, which enhances security.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong style=\"color: #ffffff;\" data-start=\"0\" data-end=\"25\">Use Password Managers<\/strong><span style=\"color: #ffffff;\"> \u2013 Using a password management app allows you to store passwords securely and in an organized way, eliminating the need<br \/>\n<\/span><\/p>\n<p><span style=\"color: #ffffff;\">to remember all your passwords.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong data-start=\"0\" data-end=\"42\">Enable Two-Factor Authentication (2FA)<\/strong> &#8211; Adding an extra layer of security (e.g., apps that generate one-time codes) ensures that even if a password<br \/>\nis compromised, access to the account remains secure.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong style=\"color: #ffffff;\" data-start=\"0\" data-end=\"30\">Change Passwords Regularly<\/strong><span style=\"color: #ffffff;\"> &#8211; Regularly changing passwords (especially<br \/>\nif there&#8217;s a suspicion of a breach) helps maintain security. It&#8217;s important<br \/>\n<\/span><\/p>\n<p><span style=\"color: #ffffff;\">to avoid using easily guessable combinations when updating passwords.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong data-start=\"0\" data-end=\"33\">Avoid Using Obvious Passwords<\/strong> &#8211; Passwords like &#8220;123456,&#8221; &#8220;admin,&#8221;<br \/>\nor the names of loved ones are easy to guess. Use combinations of letters, numbers, and special characters to strengthen security.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong style=\"color: #ffffff;\" data-start=\"0\" data-end=\"26\">Encrypt Sensitive Data<\/strong><span style=\"color: #ffffff;\"> \u2013 When storing passwords and other confidential information, always apply proper encryption, such as AES-256, to ensure that in the event of unauthorized access, the data is not easily readable.<\/span><\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":13023,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[116,179],"tags":[],"class_list":["post-13088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-atlassian-3","category-plugins-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to safely store passwords in Jira: Secure Fields app for Jira<\/title>\n<meta name=\"description\" content=\"Discover how to securely store passwords in Jira with the Secure Fields app. Ensure secure access to sensitive information.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Safely Store Passwords in Jira? Practical Application of Secure Fields\" \/>\n<meta property=\"og:description\" content=\"Discover how to securely store passwords in Jira with the Secure Fields app. Ensure secure access to sensitive information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/\" \/>\n<meta property=\"og:site_name\" content=\"Almarise\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CompanyAlmarise\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T12:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T15:40:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2067\" \/>\n\t<meta property=\"og:image:height\" content=\"1272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Rodziewicz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CompanyAlmarise\" \/>\n<meta name=\"twitter:site\" content=\"@CompanyAlmarise\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Rodziewicz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/\"},\"author\":{\"name\":\"Marta Rodziewicz\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2\"},\"headline\":\"How to Safely Store Passwords in Jira? Practical Application of Secure Fields\",\"datePublished\":\"2025-02-10T12:43:24+00:00\",\"dateModified\":\"2025-02-11T15:40:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/\"},\"wordCount\":6560,\"publisher\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"articleSection\":[\"Atlassian\",\"Plugins\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/\",\"url\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/\",\"name\":\"How to safely store passwords in Jira: Secure Fields app for Jira\",\"isPartOf\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"datePublished\":\"2025-02-10T12:43:24+00:00\",\"dateModified\":\"2025-02-11T15:40:32+00:00\",\"description\":\"Discover how to securely store passwords in Jira with the Secure Fields app. Ensure secure access to sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage\",\"url\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"contentUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"width\":2067,\"height\":1272,\"caption\":\"przechowywanie hase\u0142 Jira\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/devsite.almarise.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Safely Store Passwords in Jira? Practical Application of Secure Fields\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/#website\",\"url\":\"https:\/\/devsite.almarise.com\/en\/\",\"name\":\"Almarise\",\"description\":\"Your Amazing Atlassian Experts\",\"publisher\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/devsite.almarise.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/#organization\",\"name\":\"Almarise\",\"url\":\"https:\/\/devsite.almarise.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png\",\"contentUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png\",\"width\":150,\"height\":150,\"caption\":\"Almarise\"},\"image\":{\"@id\":\"https:\/\/devsite.almarise.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CompanyAlmarise\/\",\"https:\/\/x.com\/CompanyAlmarise\",\"https:\/\/www.youtube.com\/@almarisecompany\",\"https:\/\/www.instagram.com\/almarise_almarise\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2\",\"name\":\"Marta Rodziewicz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devsite.almarise.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg\",\"contentUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg\",\"caption\":\"Marta Rodziewicz\"},\"description\":\"Content Marketing Specialist\",\"jobTitle\":\"Content Marketing Specialist\",\"url\":\"https:\/\/devsite.almarise.com\/en\/author\/marta-rodziewicz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to safely store passwords in Jira: Secure Fields app for Jira","description":"Discover how to securely store passwords in Jira with the Secure Fields app. Ensure secure access to sensitive information.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Safely Store Passwords in Jira? Practical Application of Secure Fields","og_description":"Discover how to securely store passwords in Jira with the Secure Fields app. Ensure secure access to sensitive information.","og_url":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/","og_site_name":"Almarise","article_publisher":"https:\/\/www.facebook.com\/CompanyAlmarise\/","article_published_time":"2025-02-10T12:43:24+00:00","article_modified_time":"2025-02-11T15:40:32+00:00","og_image":[{"width":2067,"height":1272,"url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","type":"image\/png"}],"author":"Marta Rodziewicz","twitter_card":"summary_large_image","twitter_creator":"@CompanyAlmarise","twitter_site":"@CompanyAlmarise","twitter_misc":{"Written by":"Marta Rodziewicz","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#article","isPartOf":{"@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/"},"author":{"name":"Marta Rodziewicz","@id":"https:\/\/devsite.almarise.com\/en\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2"},"headline":"How to Safely Store Passwords in Jira? Practical Application of Secure Fields","datePublished":"2025-02-10T12:43:24+00:00","dateModified":"2025-02-11T15:40:32+00:00","mainEntityOfPage":{"@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/"},"wordCount":6560,"publisher":{"@id":"https:\/\/devsite.almarise.com\/en\/#organization"},"image":{"@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage"},"thumbnailUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","articleSection":["Atlassian","Plugins"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/","url":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/","name":"How to safely store passwords in Jira: Secure Fields app for Jira","isPartOf":{"@id":"https:\/\/devsite.almarise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage"},"image":{"@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage"},"thumbnailUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","datePublished":"2025-02-10T12:43:24+00:00","dateModified":"2025-02-11T15:40:32+00:00","description":"Discover how to securely store passwords in Jira with the Secure Fields app. Ensure secure access to sensitive information.","breadcrumb":{"@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#primaryimage","url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","contentUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","width":2067,"height":1272,"caption":"przechowywanie hase\u0142 Jira"},{"@type":"BreadcrumbList","@id":"https:\/\/devsite.almarise.com\/en\/how-to-safely-story-passwords-in-jira-secure-fields\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/devsite.almarise.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to Safely Store Passwords in Jira? Practical Application of Secure Fields"}]},{"@type":"WebSite","@id":"https:\/\/devsite.almarise.com\/en\/#website","url":"https:\/\/devsite.almarise.com\/en\/","name":"Almarise","description":"Your Amazing Atlassian Experts","publisher":{"@id":"https:\/\/devsite.almarise.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devsite.almarise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/devsite.almarise.com\/en\/#organization","name":"Almarise","url":"https:\/\/devsite.almarise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devsite.almarise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png","contentUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png","width":150,"height":150,"caption":"Almarise"},"image":{"@id":"https:\/\/devsite.almarise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CompanyAlmarise\/","https:\/\/x.com\/CompanyAlmarise","https:\/\/www.youtube.com\/@almarisecompany","https:\/\/www.instagram.com\/almarise_almarise\/"]},{"@type":"Person","@id":"https:\/\/devsite.almarise.com\/en\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2","name":"Marta Rodziewicz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devsite.almarise.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg","contentUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg","caption":"Marta Rodziewicz"},"description":"Content Marketing Specialist","jobTitle":"Content Marketing Specialist","url":"https:\/\/devsite.almarise.com\/en\/author\/marta-rodziewicz\/"}]}},"_links":{"self":[{"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/posts\/13088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/comments?post=13088"}],"version-history":[{"count":5,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/posts\/13088\/revisions"}],"predecessor-version":[{"id":13109,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/posts\/13088\/revisions\/13109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/media\/13023"}],"wp:attachment":[{"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/media?parent=13088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/categories?post=13088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devsite.almarise.com\/en\/wp-json\/wp\/v2\/tags?post=13088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}