-- I primarily work with companies in the life sciences industry (pharma, medtech, etc.), and this is 100% accurate for them.
I respectfully disagree. You have the right goals, but you’re not on track to meet them. RoA is going to fall flat as soon as you test it in a real-world situation. (IMHO)
Here’s the problem: Customers expect data egress. And the bigger the customer, the more they want data egress…whether they initially realize it or not.
Customers want eSign to send an email notification to the quality guy who only logs into Confluence when there’s something to approve. They want Xray to push Jira keys into Jenkins so they can include automated tests in their requirement coverage. They want ScriptRunner to trigger a webhook in ServiceNow when a Fix Version is released.
These are not integration (i.e., “connector”) apps specialized for data egress. These are business apps that require data egress to be useful inside a larger company. Shouldn’t they be eligible for RoA if the other requirements are satisfied?
Basically that. But I’d bet it’s most, not some.
In 12+ years, I’ve never worked with a large customer who didn’t have these kinds of requirements. I understand that I work in a niche industry…but then I can’t imagine any industry being more risk-averse than mine.
So, I’m seeing two problems:
- The initial RoA requirements are too strict to be useful, even for a highly-regulated industry like mine. This means you’re unlikely to solve the problem of Server/DC customers coming to the cloud and dropping most (or all) of their Marketplace apps in the process.
- The recent RFCs have backward thinking. Configurable egress is less risky than REST APIs for customers who are interested in RoA. So, as many others have mentioned, it’s confusing that REST APIs are being considered for RoA while configurable egress is not.
RoA customers want to have controlled data egress between Jira/Confluence and a vetted system (as discussed above). If I understand it correctly, configurable egress will give that control. A REST API, on the other hand, may expose data to properly vetted systems and improperly vetted systems alike, with less ability for granular access control.
Thank you for listening! Again, I’m a proponent of what you’re trying to do.