You know the drill: another production outage, another scramble for credentials. Someone forgot to rotate tokens again. The infra team swears it’s “documented.” Security rolls their eyes. That chaos disappears once OIDC Rubrik is configured right.
OIDC (OpenID Connect) handles identity. Rubrik manages data and recovery. Together they give you fine-grained, auditable control over who touches backup data, how, and when. Instead of juggling static credentials, users authenticate through your identity provider—Azure AD, Okta, or whatever your stack trusts—and Rubrik verifies each call in real time. The goal isn’t just login simplicity. It’s identity-based trust baked straight into your recovery pipeline.
At a high level, Rubrik uses OIDC to map your organization’s users and service accounts to consistent roles. Each API request includes a token from your IdP. The platform checks that token against its role mappings to decide if you can restore data, fetch reports, or trigger policies. This replaces long-lived service accounts with ephemeral tokens. When an engineer leaves or a job changes, access vanishes automatically.
A typical integration follows this flow:
- Register Rubrik as an OIDC client in your IdP.
- Set redirect URIs that align with your Rubrik cluster or cloud portal.
- Configure role mappings so groups in your directory translate to Rubrik’s RBAC model.
- Test token exchange by logging in through the Rubrik UI and verifying a valid claim set.
If access fails, check the audience field in the token. Rubrik expects tokens minted for its client ID, not another app’s. Mismatched tenants or stale JWKS URLs also cause silent login loops.