Permissions

This page explains what permissions are required to access various features in the Templify app. It also covers the custom global permission introduced by the app and how Jira administrators can manag

🛡️ Custom Global Permission: Use Issue Templates

Templify defines a global permission that controls access to app functionality:

Issue Templates - Use Issue Templates

What It Controls

This permission is required to:

  • View and use templates in the issue view (Issue Panel, Issue Action)

  • Trigger actions like Apply Template or Create from Template

  • Use the Issue Template field on the native Create Issue screen

  • See UI Modifications (e.g. field autofill with defaults)

  • all other features...

Default Setting

  • By default, this permission is granted only to jira-administrators

How to Grant Access

Jira administrators can assign it by:

  1. Going to Jira Settings → System → Global Permissions

  2. Finding “Issue Templates - Use Issue Templates”

  3. Adding user groups (e.g. jira-software-users)

🔐 Feature Access Requirements

Understand which permissions are required to access each part of the Templify app and ensure proper visibility for your users.

Module
Required permissions

Issue Panel (in issue view)

Create Issues in the current project Use Issue Templates (global permission)

Issue Action → Apply Template

Create Issues in the current project Use Issue Templates (global permission)

Create Issue → Default Values

Use Issue Templates (global permission)

Create Issue → Template Field Picker

Create Issues in the current project Use Issue Templates (global permission)

Templify Admin Pages

Jira protected page

Templify Global Page

Use Issue Templates (global permission)


🔒 Security & Execution Context

All key operations performed by Templify — including issue creation, field updates, and template application — are executed in the context of the user who triggers the action via the Jira UI.

This means:

  • The app respects Jira’s native permission model

  • Any operation the user is not authorized to perform in Jira (e.g., editing a restricted field, creating issues in a project without access) will also fail or be blocked when executed through Templify

  • The app does not escalate privileges — it never acts on behalf of a system user or administrator in background

✅ Examples of enforced restrictions:

  • If a user cannot create issues in a project, they won’t be able to apply a template to that project

  • If a field is hidden or restricted by a Field Configuration Scheme or Field Security, it will not be editable via a template

  • If a user lacks access to edit sub-tasks, templates containing sub-task structures will not be applied successfully

This ensures that all actions remain secure, auditable, and consistent with how Jira permissions are enforced elsewhere in the system.


🔄 Roadmap Insight

We're working on introducing granular permission controls in an upcoming release to give teams more flexibility and security.

This will allow administrators to:

  • Restrict access to specific features – for example, allow usage of default values but prevent managing templates

  • Differentiate between roles – such as users who can apply templates versus those who can create or edit them

  • Scope permissions more precisely across teams and projects

Stay tuned for updates in our changelog as this feature evolves.

Last updated