Available Atlassian Rovo MCP server domains
By default, we automatically allow Atlassian-supported domains to access apps in your organization. You can add the domains you trust or block Atlassian-supported domains.
These domain rules only apply to tools connecting via OAuth 2.1.
Atlassian-supported domains
Type | Domains |
|---|---|
HTTP |
|
|
|
HTTPS |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Protocol-specific | Protocol: Domain/value: |
| Protocol: Domain/value: |
How these domains are used
The domains and patterns you configure here define which client apps are allowed to use the Atlassian Rovo MCP server. See Authentication and authorization for more details.
Aspect | OAuth 2.1 (interactive consent) |
|---|---|
Who uses it | Browser‑based apps, extensions, desktop apps, local tools that can open a browser window. |
How it works | The client app redirects the user to Atlassian to show a consent screen, then receives redirects and tokens on its own URL. |
Where redirects / calls come from | Redirect URIs and token exchanges originate from the client’s URL (for example, |
What the domain rules control | Which client origins can receive OAuth 2.1 redirects and tokens. The client’s origin must match a domain or pattern in this list. |
Adding domains and patterns
When you authorize access to the Atlassian Rovo MCP server, you can add a single domain or a flexible pattern.
Option | When to use it | Example |
|---|---|---|
Add a single domain | You want to allow access from one exact origin only. |
|
Add a pattern | You want to cover multiple domains, subdomains, ports, or paths in one rule. | Use wildcards or braces, for example:
|
Domain pattern requirements
To ensure your domain patterns are accepted and secure, follow these rules when creating a pattern.
Requirement | What it means | Examples |
|---|---|---|
Always include a protocol | Every pattern must start with a protocol such as | ✅ ✅ ❌ ❌ |
Specify a valid domain or host | The pattern must include a valid domain, IP address, or host after the protocol. Wildcards ( | ✅ ✅ ❌ |
Use a port or port wildcard (optional) | You can specify a fixed port ( | ✅ ✅ |
Allow localhost domains (optional) |
| ✅ You can keep these to support local tools, or remove them to further restrict access. |
Use a path wildcard (optional) | Add | ✅ |
Use wildcards and braces for flexibility | Use | ✅ ✅ |
Pattern must be a valid URL structure | The pattern must represent a valid URL, including protocol and domain. Patterns are checked by replacing wildcards with test values to ensure they form a valid URL. | ✅ (forms valid URLs when |
Disclaimer
MCP clients can perform actions in Jira, Confluence, and Compass with your existing permissions. Use least privilege, review high‑impact changes before confirming, and monitor audit logs for unusual activity.
Learn more: MCP Clients - Understanding the potential security risks
Was this helpful?