← Code Exchange

Role-Based Authentication for Self-Hosted Temporal

How to secure your self-hosted cluster with role-based auth.

Temporal is a powerhouse for orchestrating workflows, offering durability and reliability out of the box. But when you’re running a self-hosted Temporal deployment, security becomes a critical consideration. How do you ensure that only authorized users and services can access specific workflows? The answer lies in implementing robust role-based authentication.

We show how to add custom authentication layer to secure your self-hosted Temporal deployments by enforcing role-based access control, integrating OpenID Connect (OIDC) for authentication, and maintaining robust security without affecting Temporal’s inherent reliability.

See our Blog for a more detailed walk through.

💖 Community authenticationsecurity

About the Author

Matt Chaffe headshot

Matt Chaffe

Bitovi