Create Identity Provider

Create OIDC Identity Provider for Federated Idenities

Identity providers define the external OIDC issuer and key discovery settings. You can reuse the same identity provider for multiple service accounts.

Prerequisites

Before creating an identity provider, ensure you have:

  1. Access to your OIDC provider’s configuration (issuer URL, JWKS endpoint)
  2. Knowledge of your identity provider’s token issuance settings

Configuration Steps

Step 1: Navigate to Identity Providers

Navigate to IAMIdentity Providers in your Thalassa Cloud Console.

Step 2: Create New Identity Provider

Click “Create Identity Provider” or “Add Identity Provider”.

Step 3: Configure Identity Provider

Fill in the identity provider configuration:

Basic Information:

  • Name: Choose a descriptive name (e.g., “github-actions”, “gitlab-ci”)
  • Description: Optional description of the identity provider’s purpose

OIDC Configuration:

  • OIDC Issuer URL: Enter your identity provider’s issuer URL
    • Example for GitHub Actions: https://token.actions.githubusercontent.com
    • This is the base URL that issues your OIDC tokens

JWKS Configuration: Choose one of the following options:

Option A: Automatic Discovery (Recommended)

  • Leave JWKS endpoint blank to auto-discover from the issuer’s .well-known/openid-configuration
  • Thalassa Cloud will automatically fetch the JWKS endpoint from the issuer’s well-known configuration

Option B: Custom JWKS Endpoint

  • Specify a custom JWKS endpoint URL if auto-discovery is not available
  • Example: https://token.actions.githubusercontent.com/.well-known/jwks
  • Use this if your identity provider uses a non-standard JWKS location

Option C: Custom JWKS JSON (Offline Use)

  • Provide JWKS JSON content directly for offline scenarios or when endpoint access is restricted
  • Useful for air-gapped environments or when you need to pin specific keys
  • Example format:
    jwks.json
    {
      "keys": [
        {
          "kty": "RSA",
          "use": "sig",
          "kid": "...",
          "n": "...",
          "e": "..."
        }
      ]
    }

Step 4: Review and Save

  1. Review your configuration
  2. Click “Create Identity Provider” or “Save”
  3. The identity provider is now ready to be used by federated identities

Important Considerations

Using HTTPS is required for both the issuer URL and the JWKS endpoint. Endpoints must present a valid certificate. This is important, as control of the JWKS content means control over the JWT tokens provided.