Git Integration for Jira Cloud Documentation

Creating Personal Access Tokens

Personal access tokens (PATs) provide secure authentication for connecting git services to Git Integration for Jira Cloud. This page provides step-by-step instructions for creating PATs on each supported git host.

On this page:

 


 

Create a GitHub or GitHub Enterprise PAT

If you enable two-factor authentication for your GitHub account, you must create a PAT to access your git repositories. We recommend enabling two-factor authentication for increased security.

  1. Log in to GitHub and go to your profile settings.


  2. Click Developer settings in the sidebar.


  3. Click Personal access tokens in the sidebar.

  4. Click Generate new token.

  5. Configure your token:


    a. Enter a descriptive name in the Note field (for example, git-integration-for-jira).

    b. Set the Expiration according to your organization’s policies.

    c. Under Select scopes, select the repo scope (this automatically includes all sub-scopes).

  6. Click Generate token.

  7. Copy the token immediately. This is the only time GitHub displays it.

 


 

Create a GitLab PAT

GitLab uses personal access tokens (PATs) for authentication starting with version 8.8. If you enable two-factor authentication, you must create a PAT to access your repositories.

  1. Log in to GitLab and go to your profile settings (Profile iconPreferences).


  2. Click Access Tokens in the sidebar.


  3. Configure your token:


    a. Enter a descriptive Name (for example, Git Integration for Jira).

    b. Set the Expiration date according to your organization’s policies, or leave blank for no expiration.

    c. Select the api scope.

  4. Click Create personal access token.

  5. Copy the token immediately. This is the only time GitLab displays it.

The api scope enables creating branches and merge requests from the Jira issue developer panel.

 


 

Create an Azure DevOps or VSTS PAT

PATs let you access Azure Repos without using your username or password directly.

  1. In the Azure DevOps portal, click the user settings icon in the top-right corner.


  2. Click Personal access tokens.

  3. Click (plus) New Token.

  4. Configure your token:


    a. Enter a descriptive name (for example, git-integration-for-jira).

    b. Set Organization to All accessible organizations. This setting is required.

    c. Set the lifespan according to your organization’s policies. Select Custom defined for longer expiration dates.

    d. Set Scopes to Custom defined.

    e. Set Code to Read & write.

  5. Click Create.

  6. Copy the token immediately. Use this token as your password.

About scopes:

  • Code (read) — View commits, smart commits, and browse repositories
  • Code (read and write) — All read permissions plus create branches and pull requests from Jira

 


 

Create a TFS 2017+ PAT

TFS 2017 and later versions support PATs for on-premises installations.

  1. In the TFS portal, click the user settings icon in the top-right corner, then click Security.


  2. On the Personal Access Token page, click Add.


  3. Enter a descriptive name in Description.

  4. Set the token lifespan according to your organization’s policies.

  5. Set Authorized Scopes to Selected scopes, then choose:

    • Code (read) — For viewing commits, smart commits, and browsing repositories
    • Code (read and write) — For the above plus creating branches and pull requests from Jira
  6. Click Create token.

  7. Copy the token immediately. Use this token as your password.

 


 

Create an Azure DevOps Server PAT

Azure DevOps Server (formerly Visual Studio Team Foundation Server) supports PATs for on-premises installations.

Azure DevOps Server was previously named Visual Studio Team Foundation Server (TFS).

  1. In the Azure DevOps Server portal, click your profile icon in the top-right corner, then click Security.


  2. On the Personal Access Token page, click (plus) Add.


  3. Enter a descriptive name in Description.

  4. Set the token lifespan according to your organization’s policies.

  5. Set Authorized Scopes to Selected scopes, then choose:

    • Code (read) — For viewing commits, smart commits, and browsing repositories
    • Code (read and write) — For the above plus creating branches and pull requests from Jira
  6. Click Create token.

  7. Copy the token immediately. Use this token as your password.

 


 

Create AWS CodeCommit Credentials

AWS CodeCommit uses IAM Access Keys instead of personal access tokens. An Access Key ID and Secret Access Key serve the same purpose as a PAT.

Required IAM Permissions

Grant these AWS CodeCommit IAM Policy actions to enable branch and pull request creation from Jira:

  • CodeCommit:Write:CreateBranch
  • CodeCommit:Write:CreatePullRequest

Create an Access Key

  1. In AWS IAM, go to Users ➜ select your user ➜ Security credentials.

  2. Click Create access key.


  3. Copy both the Access Key ID and Secret Access Key immediately.

AWS IAM allows a maximum of two Access Keys per IAM user.

Create a dedicated IAM user for Git Integration for Jira tasks. Do not share Access Keys with other applications.

Last updated: December 2025

Have feedback about this article? Did we miss something? Let us know!
On this page