{"id":13052,"date":"2025-02-10T13:43:24","date_gmt":"2025-02-10T12:43:24","guid":{"rendered":"https:\/\/devsite.almarise.com\/?p=13052"},"modified":"2025-02-12T14:47:30","modified_gmt":"2025-02-12T13:47:30","slug":"przechowywanie-hasel-w-jira-secure-fields","status":"publish","type":"post","link":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/","title":{"rendered":"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Zarz\u0105dzanie dost\u0119pem do zasob\u00f3w IT to kluczowe wyzwanie dla wielu firm. <span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">W idealnym \u015bwiecie wszystkie systemy powinny by\u0107 spi\u0119te z centralnym systemem do zarz\u0105dzania to\u017csamo\u015bciami i po\u015bwiadczeniami (IAM), co zapewnia jednolity, bezpieczny dost\u0119p. Jednak rzeczywisto\u015b\u0107 bywa bardziej skomplikowana i skorzystanie z IAM nie zawsze jest mo\u017cliwe. W\u0142a\u015bnie w takich przypadkach z pomoc\u0105 przychodzi aplikacja Secure Fields dla <a href=\"https:\/\/devsite.almarise.com\/pl\/jira\/\">Jira<\/a>, umo\u017cliwiaj\u0105ca bezpieczne przechowywanie i kontrolowanie dost\u0119pu do wra\u017cliwych informacji, takich jak przechowywanie hase\u0142 w Jira. W tym artykule przedstawimy praktyczny scenariusz, w kt\u00f3rym Secure Fields rozwi\u0105zuje rzeczywisty problem organizacji. <\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2067\" height=\"1272\" alt=\"safety of passwords jira\" title=\"secure fields password has\u0142o\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\" class=\"img-responsive wp-image-13022\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-200x123.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-400x246.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-600x369.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-800x492.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15-1200x738.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png 2067w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:50px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Kiedy wsp\u00f3\u0142dzielenie hase\u0142 staje si\u0119 konieczne?<\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p><span data-contrast=\"none\">Firmy posiadaj\u0105 r\u00f3\u017cne zasoby informatyczne, do kt\u00f3rych dost\u0119p jest ograniczony i chroniony. Mog\u0105 to by\u0107 zar\u00f3wno aplikacje, jak i fizyczne lub wirtualne serwery,\u00a0a tak\u017ce inne us\u0142ugi IT. Przyk\u0142adami takich zasob\u00f3w s\u0105: serwer www, maszyny wirtualne i fizyczne, serwer poczty lub dysk sieciowy.\u00a0Zazwyczaj, aby zapewni\u0107 bezpieczny dost\u0119p do tych zasob\u00f3w, korzysta si\u0119 z IAM, kt\u00f3re umo\u017cliwia zarz\u0105dzanie po\u015bwiadczeniami w spos\u00f3b scentralizowany. Niemniej jednak, w pewnych sytuacjach korzystanie z takiego centralnego systemu mo\u017ce okaza\u0107 si\u0119 niemo\u017cliwe lub nieefektywne.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Oto trzy przyk\u0142ady takich przypadk\u00f3w:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">1\ufe0f\u20e3\u00a0<\/span><b><span data-contrast=\"none\">System nie wspiera kont u\u017cytkownik\u00f3w<\/span><\/b><br \/>\n<span data-contrast=\"none\">Niekt\u00f3re systemy IT dzia\u0142aj\u0105 w modelu, w kt\u00f3rym istnieje tylko jedno wsp\u00f3lne has\u0142o dla wszystkich u\u017cytkownik\u00f3w. Nie mo\u017cna ich pod\u0142\u0105czy\u0107 do centralnego zarz\u0105dzania to\u017csamo\u015bci\u0105.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">2\ufe0f\u20e3\u00a0<\/span><b><span data-contrast=\"none\">Dost\u0119p potrzebny natychmiast<\/span><\/b><br \/>\n<span data-contrast=\"none\">Proces zak\u0142adania nowego konta u\u017cytkownika w systemie mo\u017ce by\u0107 czasoch\u0142onny, szczeg\u00f3lnie je\u015bli wymaga aprobaty administrator\u00f3w.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">3\ufe0f\u20e3\u00a0<\/span><b><span data-contrast=\"none\">Awaryjny dost\u0119p<\/span><\/b><br \/>\n<span data-contrast=\"none\">Mimo centralnego zarz\u0105dzania dost\u0119pem mog\u0105 zdarzy\u0107 si\u0119 sytuacje awaryjne. Przyk\u0142adowo, je\u015bli jedyna osoba odpowiedzialna za dost\u0119p nagle stanie si\u0119 niedost\u0119pna, firma mo\u017ce straci\u0107 kontrol\u0119 nad kluczowym zasobem.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">4\ufe0f\u20e3\u00a0<\/span><b><span data-contrast=\"none\">Konto techniczne nie zwi\u0105zane z dan\u0105 osob\u0105<\/span><\/b><br \/>\n<span data-contrast=\"none\">Konto techniczne jest wsp\u00f3\u0142dzielone mi\u0119dzy r\u00f3\u017cnymi osobami, wi\u0119c r\u00f3\u017cne osoby musz\u0105 mie\u0107 dost\u0119p do tego has\u0142a.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Jak dzia\u0142a Secure Fields w Jira?<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p><span data-contrast=\"none\">Jira mo\u017ce by\u0107 skutecznie wykorzystywana do zarz\u0105dzania zasobami IT poprzez tworzenie projekt\u00f3w i zg\u0142osze\u0144 (issues), gdzie ka\u017cde zg\u0142oszenie jest przypisane do konkretnego zasobu.<\/span><br \/>\n<span data-contrast=\"none\">W takim systemie mo\u017cna przechowywa\u0107 kluczowe informacje o ka\u017cdym zasobie, takie jak:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Nazwa zasobu<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Opis funkcji zasobu<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Adresy dost\u0119pu<\/span><\/b><span data-contrast=\"none\">\u00a0\u2013 np. adresy IP lub adresy www.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Przechowywanie wra\u017cliwych danych, takich jak has\u0142a czy po\u015bwiadczenia, w Jira wymaga odpowiednich zabezpiecze\u0144, aby unikn\u0105\u0107 ryzyka naruszenia bezpiecze\u0144stwa. W tym celu wykorzystuje si\u0119 aplikacj\u0119 Secure Fields, kt\u00f3ra zapewnia bezpieczne przechowywanie tych informacji, umo\u017cliwia ich ukrycie przed nieupowa\u017cnionymi u\u017cytkownikami, monitoruje dost\u0119p oraz zapewnia pe\u0142n\u0105 audytowalno\u015b\u0107, co gwarantuje zgodno\u015b\u0107 z najlepszymi praktykami bezpiecze\u0144stwa.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83d\udee1\ufe0f\u00a0<\/span><b><span data-contrast=\"none\">Szyfrowanie danych &#8211;\u00a0<\/span><\/b><span data-contrast=\"none\">Ze wzgl\u0119du na szczeg\u00f3ln\u0105 wra\u017cliwo\u015b\u0107 danych jakimi jest has\u0142o,<\/span><br \/>\n<span data-contrast=\"none\">dane te jest szyfrowana w bazie danych za pomoc\u0105 AES-256. Dzi\u0119ki temu, nawet w przypadku dost\u0119pu do bazy danych, nie da si\u0119 odczyta\u0107 has\u0142a.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83d\udd12<\/span><b><span data-contrast=\"none\">Uprawienia &#8211;\u00a0<\/span><\/b><span data-contrast=\"none\">Secure Fields zapewnia maksymalne bezpiecze\u0144stwo dla hase\u0142 i danych dost\u0119powych przechowywanych w Jira. Tylko wybrane osoby mog\u0105 zobaczy\u0107 przechowywane has\u0142o,\u00a0a nieupowa\u017cnione nie maj\u0105 do nich dost\u0119pu.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83d\udc65\u00a0<\/span><b><span data-contrast=\"none\">Audyt dost\u0119pu &#8211;\u00a0<\/span><\/b><span data-contrast=\"none\">Ka\u017cda pr\u00f3ba dost\u0119pu do pola \u2013 zar\u00f3wno udana, jak i nieudana \u2013 jest rejestrowana w historii Secure Fields, co zapewnia pe\u0142n\u0105 kontrol\u0119 nad tym, kto pr\u00f3bowa\u0142 odszyfrowa\u0107 warto\u015b\u0107. Dodatkowo u\u017cytkownik mo\u017ce by\u0107 pytany o pow\u00f3d dost\u0119pu.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\ud83c\udd94\u00a0<\/span><b><span data-contrast=\"none\">Dodatkowa autoryzacja &#8211;\u00a0<\/span><\/b><span data-contrast=\"none\">Administratorzy mog\u0105 wymaga\u0107 dodatkowej autoryzacji\/uwierzytelnienia od u\u017cytkownik\u00f3w pr\u00f3buj\u0105cych wy\u015bwietli\u0107 lub zmodyfikowa\u0107 warto\u015b\u0107 pola. To skuteczny spos\u00f3b na ochron\u0119 przed nieautoryzowanym dost\u0119pem np. pr\u00f3b\u0105 fizycznego dost\u0119pu do komputera u\u017cytkownika Jira.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:300}\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Praktyczne zastosowanie \u2013 krok po kroku<\/h2><\/div><div class=\"fusion-text fusion-text-4\"><p>Aby lepiej zobrazowa\u0107 spos\u00f3b dzia\u0142ania Secure Fields, poni\u017cej przedstawiamy kilka zrzut\u00f3w ekranu, kt\u00f3re ilustruj\u0105 poszczeg\u00f3lne kroki procesu:<\/p>\n<p>1\ufe0f\u20e3 Dodatkowa autoryzacja \u2013 przy pr\u00f3bie uzyskania dost\u0119pu do pola u\u017cytkownik musi przej\u015b\u0107 dodatkowy poziom weryfikacji.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1221\" height=\"596\" alt=\"secure passwords\" title=\"Secure Fields\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7.png\" class=\"img-responsive wp-image-13066\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-200x98.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-400x195.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-600x293.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-800x390.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7-1200x586.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-7.png 1221w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-5\"><p>2\ufe0f\u20e3 <span style=\"background-color: var(--awb-bg-color-hover); color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform);\">Widok pola Secure Password w zg\u0142oszeniu Jiry \u2013 tak wygl\u0105da pole przechowuj\u0105ce has\u0142o w bezpieczny spos\u00f3b.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1350\" height=\"587\" alt=\"secure passwords, secure passwords\" title=\"secure fields has\u0142a\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8.png\" class=\"img-responsive wp-image-13064\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-200x87.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-400x174.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-600x261.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-800x348.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8-1200x522.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-8.png 1350w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-6\"><p>&nbsp;<\/p>\n<p>3\ufe0f\u20e3Historia dost\u0119pu \u2013 ka\u017cda pr\u00f3ba wy\u015bwietlenia warto\u015bci pola jest rejestrowana i dost\u0119pna tylko dla uprawnionych u\u017cytkownik\u00f3w<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1060\" height=\"402\" title=\"secure fields\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9.png\" alt class=\"img-responsive wp-image-13062\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-200x76.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-400x152.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-600x228.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9-800x303.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-9.png 1060w\" sizes=\"(max-width: 640px) 100vw, 1060px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-7\"><p>&nbsp;<\/p>\n<p>4\ufe0f\u20e3 <b><span data-contrast=\"auto\">Potwierdzenie autoryzacji<\/span><\/b><span data-contrast=\"auto\"> \u2013 u\u017cytkownik, musi ponownie si\u0119 autoryzowa\u0107, przed dost\u0119pem do has\u0142a<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"1435\" height=\"647\" title=\"secure fields\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10.png\" alt class=\"img-responsive wp-image-13060\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-200x90.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-400x180.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-600x271.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-800x361.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10-1200x541.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-10.png 1435w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-8\"><p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">5\ufe0f\u20e3 Schemat uprawnie\u0144 \u2013 pokazuje, \u017ce tylko u\u017cytkownicy z odpowiednimi uprawnieniami mog\u0105 zobaczy\u0107 i edytowa\u0107 pole Secure Password. <\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"1253\" height=\"594\" title=\"secure fields\" src=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11.png\" alt class=\"img-responsive wp-image-13058\" srcset=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-200x95.png 200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-400x190.png 400w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-600x284.png 600w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-800x379.png 800w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11-1200x569.png 1200w, https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/image-11.png 1253w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;MagistralC&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">PODSUMOWANIE<\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p>Secure Fields to skuteczne rozwi\u0105zanie dla organizacji, kt\u00f3re musz\u0105 przechowywa\u0107 wra\u017cliwe dane w Jira i jednocze\u015bnie zapewni\u0107 ich bezpiecze\u0144stwo. Dzi\u0119ki szyfrowaniu, dodatkowej autoryzacji, pe\u0142nej historii dost\u0119pu i elastycznemu systemowi uprawnie\u0144, aplikacja pozwala na bezpieczne zarz\u0105dzanie po\u015bwiadczeniami. Je\u015bli Twoja firma chce poprawi\u0107 bezpiecze\u0144stwo zarz\u0105dzania dost\u0119pem w Jira, odwied\u017a Atlassian Marketplace i pobierz <a href=\"https:\/\/marketplace.atlassian.com\/apps\/1212681\/secure-fields-data-security-privacy?tab=overview&amp;hosting=cloud\">Secure Fields<\/a> do Jira ju\u017c dzi\u015b. Sprawd\u017a, jak rozwi\u0105zuje problem bezpiecznego przechowywania i kontroli dost\u0119pu do hase\u0142.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-color:#f2f2f2;--awb-bg-color-hover:#f2f2f2;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><span style=\"color: #3f3d52;\"><span style=\"color: #666666;\"><b style=\"font-size: 22px; color: #3f3d52;\" data-fusion-font=\"true\">DOBRE PRAKTYKI TWORZENIA HASE\u0141<\/b><\/span><\/span><\/span><\/p>\n<p>Wa\u017cnym aspektem zarz\u0105dzania has\u0142ami jest unikanie u\u017cywania tego samego has\u0142a<br \/>\nwsz\u0119dzie. Ka\u017cde konto powinno mie\u0107 unikalne, trudne do zgadni\u0119cia has\u0142o, <span style=\"font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover); color: #3f3d52;\">co znacz\u0105co zwi\u0119ksza bezpiecze\u0144stwo. W praktyce, gdy mamy do czynienia <\/span><span style=\"font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover); color: #3f3d52;\">z wieloma <\/span><span style=\"font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover); color: #3f3d52;\">has\u0142ami w r\u00f3\u017cnych systemach, ich zapami\u0119tanie staje si\u0119 trudne<\/span><span style=\"font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover); color: #3f3d52;\">.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-size:18px;--awb-item-padding-top:16px;--awb-item-padding-right:16px;--awb-item-padding-bottom:16px;--awb-item-padding-left:16px;--awb-odd-row-bgcolor:#3f3d54;--awb-even-row-bgcolor:#a1e2a3;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#5db038;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><b style=\"color: #ffffff;\">U\u017cywaj unikalnych hase\u0142 <\/b><span style=\"color: #ffffff;\">\u2013 Ka\u017cde konto powinno mie\u0107 osobne, trudne do zgadni\u0119cia has\u0142o. Unikanie ponownego wykorzystywania tych samych hase\u0142 w r\u00f3\u017cnych systemach zmniejsza ryzyko ich przej\u0119cia.<\/span><\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b style=\"color: #2a0035;\">Stosuj d\u0142ugie has\u0142a<\/b><span style=\"color: #2a0035;\"> \u2013 D\u0142ugie has\u0142o (przynajmniej 12-16 znak\u00f3w) jest trudniejsze do z\u0142amania. Im wi\u0119cej znak\u00f3w, tym wi\u0119cej mo\u017cliwych kombinacji, co zwi\u0119ksza bezpiecze\u0144stwo.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b style=\"color: #ffffff;\">U\u017cywaj mened\u017cer\u00f3w hase\u0142 <\/b><span style=\"color: #ffffff;\">\u2013 Korzystanie z aplikacji do zarz\u0105dzania has\u0142ami pozwala przechowywa\u0107 je w spos\u00f3b bezpieczny i \u0142atwy do zorganizowania, eliminuj\u0105c konieczno\u015b\u0107 zapami\u0119tywania wszystkich hase\u0142.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b> <span style=\"color: #2a0035;\">W\u0142\u0105cz uwierzytelnianie dwusk\u0142adnikowe (2FA)<\/span><\/b><span style=\"color: #2a0035;\"> \u2013 Wykorzystanie dodatkowej warstwy zabezpiecze\u0144 (np. aplikacji generuj\u0105cych kody jednorazowe) sprawia, \u017ce nawet w przypadku ujawnienia has\u0142a, dost\u0119p do konta nadal pozostaje bezpieczny.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b style=\"color: #ffffff;\">Regularnie zmieniaj has\u0142a<\/b><span style=\"color: #ffffff;\"> \u2013 Regularna zmiana hase\u0142 (zw\u0142aszcza w przypadku podejrzenia ich naruszenia) pomaga w utrzymaniu bezpiecze\u0144stwa. Wa\u017cne jest, aby nie zmienia\u0107 hase\u0142 na \u0142atwe do odgadni\u0119cia kombinacje.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b style=\"color: #2a0035;\">Unikaj u\u017cywania oczywistych hase\u0142<\/b><span style=\"color: #2a0035;\"> \u2013 Has\u0142a takie jak &#8222;123456&#8221;, &#8222;admin&#8221; czy imiona os\u00f3b bliskich s\u0105 \u0142atwe do odgadni\u0119cia. U\u017cywaj kombinacji liter, cyfr i znak\u00f3w specjalnych, aby wzmocni\u0107 bezpiecze\u0144stwo.<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b style=\"color: #ffffff;\">Szyfruj wra\u017cliwe dane<\/b><span style=\"color: #ffffff;\"> \u2013 Przechowuj\u0105c has\u0142a i inne poufne dane, zawsze stosuj odpowiednie szyfrowanie, np. AES-256, aby w razie nieautoryzowanego dost\u0119pu nie by\u0142y one \u0142atwe do odczytania.<\/span><\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":13022,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[113,163],"tags":[],"class_list":["post-13052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-atlassian","category-plugins"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bezpieczne przechowywanie hase\u0142 w Jira: Secure Fields<\/title>\n<meta name=\"description\" content=\"Dowiedz si\u0119, jak Secure Fields pomaga chroni\u0107 wra\u017cliwe informacje, u\u0142atwia przechowywanie hase\u0142 w Jira i kontrolowanie dost\u0119pu do zasob\u00f3w IT.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields\" \/>\n<meta property=\"og:description\" content=\"Dowiedz si\u0119, jak Secure Fields pomaga chroni\u0107 wra\u017cliwe informacje, u\u0142atwia przechowywanie hase\u0142 w Jira i kontrolowanie dost\u0119pu do zasob\u00f3w IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/\" \/>\n<meta property=\"og:site_name\" content=\"Almarise\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CompanyAlmarise\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T12:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-12T13:47:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2067\" \/>\n\t<meta property=\"og:image:height\" content=\"1272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Rodziewicz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CompanyAlmarise\" \/>\n<meta name=\"twitter:site\" content=\"@CompanyAlmarise\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Rodziewicz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/\"},\"author\":{\"name\":\"Marta Rodziewicz\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2\"},\"headline\":\"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields\",\"datePublished\":\"2025-02-10T12:43:24+00:00\",\"dateModified\":\"2025-02-12T13:47:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/\"},\"wordCount\":5933,\"publisher\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#organization\"},\"image\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"articleSection\":[\"Atlassian\",\"Plugins\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/\",\"url\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/\",\"name\":\"Bezpieczne przechowywanie hase\u0142 w Jira: Secure Fields\",\"isPartOf\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"datePublished\":\"2025-02-10T12:43:24+00:00\",\"dateModified\":\"2025-02-12T13:47:30+00:00\",\"description\":\"Dowiedz si\u0119, jak Secure Fields pomaga chroni\u0107 wra\u017cliwe informacje, u\u0142atwia przechowywanie hase\u0142 w Jira i kontrolowanie dost\u0119pu do zasob\u00f3w IT.\",\"breadcrumb\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage\",\"url\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"contentUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png\",\"width\":2067,\"height\":1272,\"caption\":\"przechowywanie hase\u0142 w Jira, secure passwords, store passwords, store passwords in jira\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/devsite.almarise.com\/pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#website\",\"url\":\"https:\/\/devsite.almarise.com\/pl\/\",\"name\":\"Almarise\",\"description\":\"Your Amazing Atlassian Experts\",\"publisher\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/devsite.almarise.com\/pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#organization\",\"name\":\"Almarise\",\"url\":\"https:\/\/devsite.almarise.com\/pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png\",\"contentUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png\",\"width\":150,\"height\":150,\"caption\":\"Almarise\"},\"image\":{\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CompanyAlmarise\/\",\"https:\/\/x.com\/CompanyAlmarise\",\"https:\/\/www.youtube.com\/@almarisecompany\",\"https:\/\/www.instagram.com\/almarise_almarise\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2\",\"name\":\"Marta Rodziewicz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/devsite.almarise.com\/pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg\",\"contentUrl\":\"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg\",\"caption\":\"Marta Rodziewicz\"},\"description\":\"Content Marketing Specialist\",\"jobTitle\":\"Content Marketing Specialist\",\"url\":\"https:\/\/devsite.almarise.com\/pl\/author\/marta-rodziewicz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bezpieczne przechowywanie hase\u0142 w Jira: Secure Fields","description":"Dowiedz si\u0119, jak Secure Fields pomaga chroni\u0107 wra\u017cliwe informacje, u\u0142atwia przechowywanie hase\u0142 w Jira i kontrolowanie dost\u0119pu do zasob\u00f3w IT.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pl_PL","og_type":"article","og_title":"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields","og_description":"Dowiedz si\u0119, jak Secure Fields pomaga chroni\u0107 wra\u017cliwe informacje, u\u0142atwia przechowywanie hase\u0142 w Jira i kontrolowanie dost\u0119pu do zasob\u00f3w IT.","og_url":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/","og_site_name":"Almarise","article_publisher":"https:\/\/www.facebook.com\/CompanyAlmarise\/","article_published_time":"2025-02-10T12:43:24+00:00","article_modified_time":"2025-02-12T13:47:30+00:00","og_image":[{"width":2067,"height":1272,"url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","type":"image\/png"}],"author":"Marta Rodziewicz","twitter_card":"summary_large_image","twitter_creator":"@CompanyAlmarise","twitter_site":"@CompanyAlmarise","twitter_misc":{"Napisane przez":"Marta Rodziewicz","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#article","isPartOf":{"@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/"},"author":{"name":"Marta Rodziewicz","@id":"https:\/\/devsite.almarise.com\/pl\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2"},"headline":"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields","datePublished":"2025-02-10T12:43:24+00:00","dateModified":"2025-02-12T13:47:30+00:00","mainEntityOfPage":{"@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/"},"wordCount":5933,"publisher":{"@id":"https:\/\/devsite.almarise.com\/pl\/#organization"},"image":{"@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage"},"thumbnailUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","articleSection":["Atlassian","Plugins"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/","url":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/","name":"Bezpieczne przechowywanie hase\u0142 w Jira: Secure Fields","isPartOf":{"@id":"https:\/\/devsite.almarise.com\/pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage"},"image":{"@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage"},"thumbnailUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","datePublished":"2025-02-10T12:43:24+00:00","dateModified":"2025-02-12T13:47:30+00:00","description":"Dowiedz si\u0119, jak Secure Fields pomaga chroni\u0107 wra\u017cliwe informacje, u\u0142atwia przechowywanie hase\u0142 w Jira i kontrolowanie dost\u0119pu do zasob\u00f3w IT.","breadcrumb":{"@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#primaryimage","url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","contentUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2025\/02\/obraz-15.png","width":2067,"height":1272,"caption":"przechowywanie hase\u0142 w Jira, secure passwords, store passwords, store passwords in jira"},{"@type":"BreadcrumbList","@id":"https:\/\/devsite.almarise.com\/pl\/przechowywanie-hasel-w-jira-secure-fields\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/devsite.almarise.com\/pl\/"},{"@type":"ListItem","position":2,"name":"Jak bezpiecznie przechowywa\u0107 has\u0142a w Jira? Praktyczne zastosowanie Secure Fields"}]},{"@type":"WebSite","@id":"https:\/\/devsite.almarise.com\/pl\/#website","url":"https:\/\/devsite.almarise.com\/pl\/","name":"Almarise","description":"Your Amazing Atlassian Experts","publisher":{"@id":"https:\/\/devsite.almarise.com\/pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devsite.almarise.com\/pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/devsite.almarise.com\/pl\/#organization","name":"Almarise","url":"https:\/\/devsite.almarise.com\/pl\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/devsite.almarise.com\/pl\/#\/schema\/logo\/image\/","url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png","contentUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2022\/03\/logo-almarise-favicon.png","width":150,"height":150,"caption":"Almarise"},"image":{"@id":"https:\/\/devsite.almarise.com\/pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CompanyAlmarise\/","https:\/\/x.com\/CompanyAlmarise","https:\/\/www.youtube.com\/@almarisecompany","https:\/\/www.instagram.com\/almarise_almarise\/"]},{"@type":"Person","@id":"https:\/\/devsite.almarise.com\/pl\/#\/schema\/person\/2ab482bbb53933fa42c0b7dffa39aba2","name":"Marta Rodziewicz","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/devsite.almarise.com\/pl\/#\/schema\/person\/image\/","url":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg","contentUrl":"https:\/\/devsite.almarise.com\/wp-content\/uploads\/2024\/10\/cropped-jpg-96x96.jpg","caption":"Marta Rodziewicz"},"description":"Content Marketing Specialist","jobTitle":"Content Marketing Specialist","url":"https:\/\/devsite.almarise.com\/pl\/author\/marta-rodziewicz\/"}]}},"_links":{"self":[{"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/posts\/13052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/comments?post=13052"}],"version-history":[{"count":5,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/posts\/13052\/revisions"}],"predecessor-version":[{"id":13110,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/posts\/13052\/revisions\/13110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/media\/13022"}],"wp:attachment":[{"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/media?parent=13052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/categories?post=13052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devsite.almarise.com\/pl\/wp-json\/wp\/v2\/tags?post=13052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}