Role-Based Authentication for Self-Hosted Temporal
How to secure your self-hosted cluster with role-based auth.
Temporal is a powerhouse for orchestrating workflows, offering durability and reliability out of the box. But when you’re running a self-hosted Temporal deployment, security becomes a critical consideration. How do you ensure that only authorized users and services can access specific workflows? The answer lies in implementing robust role-based authentication.
We show how to add custom authentication layer to secure your self-hosted Temporal deployments by enforcing role-based access control, integrating OpenID Connect (OIDC) for authentication, and maintaining robust security without affecting Temporal’s inherent reliability.
See our Blog for a more detailed walk through.