Requires Enterprise plan. Contact sales for access.
OIDC Discovery Endpoint
Ona exposes an OIDC discovery endpoint at:Setting up OIDC Authentication with a third party
Setting up OIDC Authentication generally involves three main steps:- Establish Trust: Register Ona with your OIDC-supported third party (like AWS, Google, etc.). This third party becomes the audience in your JWT token generated in Ona.
- Setup Trust Rules: Configure what the JWT claims must contain to be exchanged for a valid auth token. Here you can implement fine-grained access controls.
-
Exchange the JWT token: Once trust and trust rules are established, use the JWT tokens generated by the
gitpod idp tokencommand to authenticate with the third party.
Provider specific guides
Read more:CLI integration
You can retrieve a JWT token for OIDC usinggitpod idp. To retrieve the OIDC token for the current environment, run gitpod idp token.
For example, to request a new OIDC JWT for example.org, execute:
--decode flag:
Access Control Examples
Subject claim format
Depending on the principal, thesub claim has the following format:
- Users:
org:<orgID>/user:<userID> - Runners:
org:<orgID>/rnr:<runnerID> - Environments without a project:
org:<orgID>/env:<environmentID> - Environments from a project:
org:<orgID>/prj:<projectID>/env:<environmentID>
Granting access to anyone in the organization
You can configure your third-party service to grant access based on theorg:<orgID> prefix.
Granting access to an Environment created from a specific project
You can grant your third-party service access to an environment created from a specific project by matching theorg:<orgID>/prj:<projectID> prefix.
Grant access to a specific Environment
You can grant your third-party service access to a specific environment by matching theorg:<orgID>/prj:<projectID>/env:<environmentID> prefix.