Configure OpenID Connect (OIDC) Authentication For Deploy
This topic describes how to configure Deploy authentication using the OpenID Connect (OIDC) protocol.
This topic describes how to configure Deploy authentication using the OpenID Connect (OIDC) protocol.
This topic describes how to configure Keycloak to authenticate Deploy users and REST API calls (using the Bearer Token Authorization).
By default, Deploy authenticates users and retrieves authorization information from its repository. You can also configure Deploy to use an LDAP repository to authenticate users and to retrieve role (group) membership. In this scenario, the LDAP users and groups are used as principals in Deploy that can be mapped to Deploy roles. Role membership and rights assigned to roles are always stored in the Deploy repository.
By default, Deploy authenticates users and retrieves authorization information from its repository. Deploy can also be configured to use an Atlassian Crowd repository to authenticate users and to retrieve role (group) membership. In this scenario, the Atlassian Crowd users and groups are used as principals in Deploy and can be mapped to Deploy roles. Role membership and rights assigned to roles are stored in the Deploy repository.
Deploy supports role-based access control (RBAC) with two types of users:
To set up LDAP:
As a System Administrator, you can view information about active user sessions, enabling you to proactively mitigate the impact of a system maintenance outage or similar event for active users. You can also use the Active Sessions page to drill down into deployment tasks and control tasks associated with a user.