Your internal developer portal looks slick until someone tries to reach a private service over TCP. Then the applause stops. Backstage organizes everything, yet the messy part happens underneath: getting secure, identity-aware access to ports, not just APIs. That’s where Backstage TCP Proxies step in, or more accurately, where they should.
A Backstage TCP Proxy is the bridge between your cataloged resources and the networks that guard them. It routes requests from a developer’s browser or CLI to your actual infrastructure through verified identity. Instead of juggling SSH tunnels or temporary VPNs, your team gets predictable, policy-controlled access. Think of it as turning network plumbing into part of your developer experience.
When integrated correctly, Backstage TCP Proxies tie into identity providers like Okta, Azure AD, or Google Workspace. Each action becomes traceable through OIDC tokens or short-lived credentials derived from your existing login. Permissions flow naturally from Backstage’s catalog metadata, so if service ownership changes, access changes too. No manual ticket, no guessing who can reach what.
In practice, the workflow is simple. A developer finds a component in Backstage, clicks “connect,” and the proxy spins up a trusted path to that resource. The system enforces RBAC rules, rotates secrets automatically, and logs session details for audit. It replaces inconsistent ad hoc tunnels with structured, repeatable connections—something your SOC 2 auditor might actually appreciate.
Backstage TCP Proxy Integration Best Practices
- Use time-bound tokens to harden sessions against reuse.
- Map catalog entities to IAM roles instead of static IP lists.
- Rotate proxy certificates with automation tied to your CI/CD pipeline.
- Keep logs outside the proxy container for tamper resistance and clarity.
- Limit proxy scope by namespace, not user, to simplify policy grouping.
Featured Answer
Backstage TCP Proxies allow developers to securely access internal network resources from Backstage’s interface using identity-aware routing rather than raw credentials, improving control, auditability, and developer velocity.