Jira Workflow
Keeper vault integration for request-based access management through Jira issues.

This integration is not live yet. ETA January 2026
About
The Keeper Security Integration for Jira is an Atlassian Forge application that enables seamless management of Keeper vault operations directly from Jira issues. This integration bridges the gap between project management workflows and secrets management, allowing teams to request, approve, and execute credential operations without leaving their Jira environment.
Features
Vault Operations from Jira
Create New Records: Add credentials, secure notes, payment cards, and custom record types
Update Records: Modify existing vault records with new information
Share Records: Grant or revoke access to individual records with time-bound permissions
Share Folders: Manage folder-level access for teams and users
Manage Permissions: Control granular access rights for records in shared folders
Endpoint Privilege Management (Administrator Only)
Real-Time Approval Workflows: Review and approve privilege elevation requests from endpoints
Live Request Monitoring: View pending requests with countdown timers and detailed context
One-Click Actions: Approve or deny requests instantly with full audit trail
Comprehensive Request Details: User identity, application, justification, and expiration status
Smart Search & Filtering: Find requests by user, application, or justification text
Role-Based Workflows
Admin Direct Execution: Project administrators can execute vault operations immediately
User Request & Approval: Non-admin users submit requests that require admin approval
Audit Trail: All actions are logged as Jira comments with timestamps and user information
Prerequisites
Jira Cloud Administrator Access
Administrator:
Needs Jira Administrator or Manage apps permission to install and configure the Forge app.
Must access Jira Settings → Apps to set up and manage app connections.
End User:
Requires Edit Issues and Add Comments permissions to view and use the Keeper panel
Works across all Jira Cloud project types; no extra setup needed
See Jira Project Permissions for details
Keeper Security Account
Standard Features:
Requires an active Keeper Business, Enterprise, or PAM subscription with vault access.
Ensure permissions to create, update, and share records.
PEDM Features (Optional):
Active Keeper PAM (Privileged Access Management) subscription
PEDM module enabled and configured in your Keeper environment
PEDM deployments, agents, and policies configured
For more information, see Endpoint Privilege Manager Overview
Keeper Commander CLI
Install using Docker or Python pip.
Version Requirement: Commander CLI version 17.1.7 or later is required for API v2 async queue support.
Docker provides an isolated environment with simplified updates and consistent cross-platform behavior.
Refer to the Installation and Setup Guide for installation steps.
Persistent Login & Timeout : Keeper Commander supports Persistent Login (Stay Logged In) which allows you to automatically authenticate without entering your master password or 2FA each time. This improves usability for everyday CLI usage and automation.
How It Works
Login tokens are stored securely in the local
config.jsonSession persists across terminal restarts
Device must be registered and trusted
Enable Persistent Login
Configure Timeout
Tunneling
Keeper Commander Service Mode runs locally, so tunneling is required to securely expose its REST API to Jira Cloud.
You can use solutions like Ngrok or Cloudflare Tunnel to create a secure HTTPS bridge between Jira Cloud and your local environment.
See Service Tunneling Guide for setup details.
Setup
Service Mode REST API Configuration & Deployment
Purpose: Service Mode turns Keeper Commander into a REST API server, exposing the /api/v2/executecommand-async endpoint for asynchronous command execution with queue support. A secure API key is automatically generated on startup. Requires Commander CLI version 17.1.7 or later.
Required Commands:
For Vault Operations
record-add, list, ls, get, record-type-info, record-update, share-record, share-folder, rti, record-permission, service-status.For Vault + PEDM Operations
record-add, list, ls, get, record-type-info, record-update, share-record, share-folder, rti, record-permission, pedm, service-status.
Run Mode: Foreground (
-rm foreground).Queue System: Enabled (
-q y) - Required for API v2 async queue mode.Authentication: KSM Token, User/Password, or Config File.
Persistent Login: Must be enabled (
this-device persistent-login on) for continuous operation.Deployment Options:
Docker basic deployment.
Docker with Ngrok tunneling.
Docker with Cloudflare tunneling.
CLI deployment without Docker, optionally with Ngrok or Cloudflare tunneling.
API Key: Displayed after service creation; must be stored securely and used in Jira integration.
Security: Configuration files are encrypted to protect sensitive data including API keys and tokens.
API v2 (Async Queue Mode)
This integration uses Keeper Commander API v2 which provides:
Asynchronous Execution: Commands are submitted to a queue and processed asynchronously
Polling-based Results: Results are retrieved via polling with exponential backoff
Rate Limiting: Handles 429 (rate limit) and 503 (queue full) responses gracefully
Request Expiration: Automatic handling of expired requests
/api/v2/executecommand-async
POST
Submit command to async queue
/api/v2/status/{request_id}
GET
Check request status
/api/v2/result/{request_id}
GET
Get command result
Reference: API v2 Documentation
Example Docker Deployment Commands
Basic Deployment :
With Ngrok Tunneling :
With Cloudflare Tunneling :
Parameters: -ng Ngrok auth token, -cd Ngrok custom domain (subdomain portion only), -cf Cloudflare tunnel token, -cfd Cloudflare custom domain.
Keeper Commander CLI Deployment (Without Docker)
First, install Keeper Commander CLI and configure persistent login:
Basic Service Creation :
With Ngrok Tunneling :
With Cloudflare Tunneling :
Note: After service creation, the API key will be displayed in the console output. Make sure to copy and store it securely.
Reference: Service Mode REST API Documentation
Quick Start Guide
Configuration (Administrator only)
Configure the Integration
In Jira: Apps → Keeper.
Enter API URL including the /api/v2 path and API Key.
Example URLs:
ngrok:
https://your-subdomain.ngrok.io/api/v2Cloudflare:
https://your-subdomain.trycloudflare.com/api/v2
Test Connection
Click Test Connection → verify success.
Save Settings
Click Save Settings → confirmation appears.

Admin configuration complete.
Endpoint Privilege Manager (Administrator only)
The web trigger URL is automatically generated by Jira Forge and serves as the webhook endpoint for Keeper Security alerts.
Locate the Web Trigger URL in the configuration page (displayed at the top of the tab).
Copy the URL by clicking the "Copy URL" button.
Configure this URL in Keeper Security:
Navigate to your Keeper Security Admin Console.
Go to Reporting & Alerts → Alerts click on "Add Alert".
Provide Alert Name (e.g., "Jira PEDM Integration").
In Alert Condition, set Event Type to "All" from "Endpoint Privilege Management".
Click on "Add Recipient".
Enter Recipient Name (e.g., "Jira Webhook").
Click on "Webhook" option.
Paste the copied URL as the webhook destination.
Click "Save" button on the Add Recipient modal.
Click "Save" on the Alerts page.
Target Project Configuration: Configure which Jira project should receive automatically created tickets from Keeper Security alerts.
Select Target Project.
Select Default Issue Type.
Save Configuration



What Happens When a Keeper Alert is Received?
Webhook Received: Keeper Security sends a POST request to your web trigger URL.
Ticket Created: A Jira ticket is automatically created in your configured project.
Data Enrichment: The system attempts to fetch enriched PEDM approval details using pedm approval view command.
Description Populated:
Enriched: If API data is available, includes justification, user details, application info, and countdown timers.
Basic: If API data is unavailable, uses the raw webhook payload.
Labels Applied: Automatic labels include keeper-webhook, category, and audit_event.
Action Panel: For PEDM approval requests, the issue panel includes Approve/Deny buttons with real-time countdown.
Note: If the Keeper Commander service-mode URL is not accessible or the server running service mode is unavailable during the time a webhook is received, tickets will still be created successfully but will use the Alert JSON payload from the webhook as the ticket description. The integration automatically falls back to webhook payload data to ensure no security events are lost, even when the Keeper API is temporarily unavailable. Once the service is restored, new tickets will include enriched data from the PEDM approval view command.
Create Ticket (Admin / End User)
Navigate to your Jira project (e.g., IT Support, Security Operations)
Create a new ticket.
Open a Jira Issue Page
On the right side panel, look for Keeper panel on the right.
The panel will load and display available Keeper actions.
Select action: Request Access to Record / Request Access to Folder / Request Record Permission Change.
Fill in form fields (required fields marked *).
Submit for Approval
First submission: Click Save Request to submit for admin approval.
Updating existing request: Click Update Request to modify your previously saved request.
A confirmation message will appear: "Request submitted successfully" or "Request updated successfully".
Monitor Status
Jira comments show request status.
Once approved, action executes.
Note: You must have Edit Issues permission to see and use the Keeper panel.


Handling Tickets and Requests (Administrator Only)
As an administrator, you'll handle two types of tickets in Jira:
Webhook-created tickets: Automatic PEDM approval requests from Keeper Security alerts.
User-created tickets: Manual tickets where users have saved Keeper command requests.
Step-by-Step Workflow
Open JIRA issue panel : Navigate to the ticket that requires your attention.
Open the Keeper Panel : Click the Keeper panel in the right sidebar to expand it.
Review the request :
For PEDM Approval Tickets :
Review requester information (user info, application info, justification, etc).
Verify the requested action.
Assess security implications.
For Normal User Requests :
Review all saved request details.
Verify user's justification (in Requirements and Justification fields).
Check and select which action will be executed.
Based on selected action and requirements, select particular record/folder from the dropdown.
Configure permissions and expiration settings as appropriate.
Assess if the request meets security policies.
Modify Request (Optional) : As an administrator, you can override any field before execution.
Common Modifications :
Change user email addresses (supports multiple: [email protected], [email protected]).
Update record details (title, login, password, URL).
Adjust permissions (Can Edit, Can Share).
Modify expiration settings.
Change any command parameters.
Email Validation :
All emails are validated automatically.
Error message appears if format is invalid.
Execute or Approve :
For PEDM Approval Tickets :
Click Approve Request to grant privilege escalation.
Click Deny Request to reject the request.
Action executes immediately via Keeper API.
Result appears in the panel and ticket comments.
For Normal User Requests :
Click Approve & Execute to Execute Command via Keeper API.
Click on Reject request to reject it by providing reason.
Wait for execution.
Result appears in ticket comments.
Review Execution Results :
Success Response :
Green confirmation message in the panel
Success comment added to ticket
Command output shown (if applicable)
Error Response :
Red error message in the panel
Error details in ticket comments
Check Keeper service status if needed:
keeper service-status
Integration Actions & Usage
Once the Keeper Security Integration is configured in Jira, users can perform key vault operations and administrators can manage PEDM approvals directly from Jira issues. The following table summarizes the core actions available and when to use them:
Grant or revoke access to individual records; use for time-bound access, temporary access, or team sharing.
Manage folder-level access and permissions for users or teams; useful for temporary project or contractor access.
Manage granular access to records within shared folders; enforce least-privilege and compliance.
Create New Secret (Admin Only)
Add new records to the Keeper vault; ideal for onboarding and provisioning new credentials.
Update Record (Admin Only)
Modify existing record fields such as passwords, usernames, URLs, or custom fields; for credential updates and password rotation.
Endpoint Privilege Approval (Admin Only)
Review and approve/deny privilege elevation requests from endpoints in real-time
Troubleshooting
Debug Mode
If the Commander Service Mode REST API is not behaving as expected, enable debug mode for detailed logs and troubleshooting.
Or (Docker):
When debug mode is enabled:
Console or Docker logs show detailed request/response traces
Useful for identifying configuration or API communication issues
Should be disabled in production to avoid exposing sensitive metadata
Endpoint Privilege Management
Issue: Tickets Created with JSON Payload Instead of Enriched Data
Symptoms: Tickets show webhook JSON payload in description instead of formatted approval details
Cause: Keeper Commander service-mode is not accessible or API endpoint is down
Solutions:
Check Service Mode Status via CLI keeper service-status
Verify API Accessibility and Status
Test API endpoint and check service status:
Check if server is running and accessible from Jira
Verify firewall rules allow access
Restart Service Mode
Note: Tickets will continue to be created using webhook payload data during service outages to ensure no security events are lost. Once service is restored, new tickets will include enriched data from the PEDM approval view command.
Connection Problems
Connection Failed / Timeout
Service Mode not running or tunnel not reachable
Verify the Service Mode instance is active and accessible. Ensure the Ngrok or Cloudflare tunnel is live and points to the correct port.
401 Unauthorized / 403 Forbidden
Invalid or expired API key
Retrieve the correct API key from Service Mode logs and update it in the Jira configuration. Confirm no spaces or extra characters are included.
404 Not Found
Incorrect or incomplete API URL
404 Not Found | Incorrect or incomplete API URL | Use the complete API v2 URL including the /api/v2 path (e.g., https://xxxxx.ngrok-free.app/api/v2 or https://xxxxx.trycloudflare.com/api/v2). Ensure the tunnel forwards to the same port used by Service Mode.
502 Bad Gateway / 503 Service Unavailable
Service Mode offline or unresponsive
Restart the Service Mode instance and allow it to fully initialize. Review recent logs for configuration or authentication issues.
Actions Fail Despite Successful Connection
Missing commands or insufficient permissions
Confirm all required commands are enabled in Service Mode. Verify Keeper vault access permissions for the account executing the actions.
Last updated
Was this helpful?

