Every engineer has lived this moment: you open Dynatrace, get hit with an expired token, dig out an old secret, and burn five minutes chasing an access issue instead of debugging real performance data. The fix is not exotic. It is called Dynatrace OIDC, and it turns authentication into something repeatable, auditable, and nearly boring—which is exactly what security should be.
OpenID Connect, or OIDC, sits on top of OAuth 2.0 as the industry standard for delegated identity. Instead of handing Dynatrace long-lived API tokens, you let it verify users through an external identity provider like Okta, Azure AD, or Google Workspace. Dynatrace trusts the signed identity claims, applies its internal access policies, and everyone sleeps better knowing users never see the service credentials. You gain traceability. Users gain convenience. No more static keys hiding in CI/CD pipelines.
The integration flow is straightforward once you understand the logic. Your identity provider issues JWTs that contain user, group, and possibly role information. Dynatrace consumes those tokens during login or API calls, checks the signature against the OIDC configuration, and maps roles to permissions inside its environment. RBAC stays consistent with what you already have in your directory service, so onboarding a junior SRE means adding them to the right group, not editing a credentials file.
For best results, keep token lifetimes short, rotate client secrets regularly, and use the “audience” claim to prevent token reuse across apps. If you have multiple Dynatrace environments, isolate them with separate OIDC clients. Misconfigured scopes or missing redirect URLs are the most common pitfalls—simple to fix once you realize Dynatrace validates exact string matches.
When Dynatrace OIDC is configured well, you get more than login simplification: