All posts

The simplest way to make CircleCI TCP Proxies work like it should

Ever kicked off a CircleCI job that needs to reach a locked-down internal service? You know the dance. Bastion host, VPN, static IP allowlists, or some ad-hoc tunnel running on your laptop. It feels fragile because it is. CircleCI TCP Proxies exist to fix that without leaving backdoors open. CircleCI’s TCP Proxy feature lets your jobs connect securely to private resources during builds. Think databases behind corporate firewalls or services only reachable inside a VPC. Instead of juggling jump

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Ever kicked off a CircleCI job that needs to reach a locked-down internal service? You know the dance. Bastion host, VPN, static IP allowlists, or some ad-hoc tunnel running on your laptop. It feels fragile because it is. CircleCI TCP Proxies exist to fix that without leaving backdoors open.

CircleCI’s TCP Proxy feature lets your jobs connect securely to private resources during builds. Think databases behind corporate firewalls or services only reachable inside a VPC. Instead of juggling jump boxes, you route traffic through a managed proxy that enforces authentication and short-lived access. The pipeline stays cloud-native while your data stays inside.

Conceptually it works like this: CircleCI provisions an ephemeral proxy endpoint, authenticates your job’s identity, and tunnels the TCP connection to a target inside your network. The proxy lives only for the job’s duration. It dies quietly with the container, which means attackers have no leftovers to exploit.

When paired with identity providers like Okta or AWS IAM and integrated through OIDC tokens, these proxies turn into fine-grained gates. Each job can prove who it is and what it’s allowed to reach, without anyone sharing database passwords in plain text. The connection behaves like a VPN designed for automation, not humans.

If you have multi-environment builds that span staging, QA, and production, using CircleCI TCP Proxies keeps policy consistent. You can enforce least privilege across all stages. Permissions travel with the pipeline, not with whoever happens to trigger it. That shrinks your audit surface and simplifies SOC 2 reviews.

Use short token lifetimes. Rotate access at the network boundary, not inside jobs. Avoid environment variables for credentials tied to network reachability. If something breaks, start by verifying your network’s CIDR ranges and OIDC claim mappings before touching your build configs.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of this approach include:

  • Private resource access without persistent tunnels or static IPs
  • Automated identity enforcement per pipeline job
  • Reduced network leakage and faster incident isolation
  • Simpler compliance mapping for internal audit reviews
  • Cleaner logs that link each connection to build metadata instead of manual users

Developers feel the impact most. No waiting for IT to open ports or approve temporary VPN accounts. Build jobs become faster, debugging is cleaner, and onboarding new teammates takes minutes rather than days. Developer velocity improves because infrastructure fades into the background.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. You define intent once, and the system applies it everywhere, even when your pipelines scale across multiple environments.

How do CircleCI TCP Proxies differ from SSH tunnels?
A TCP Proxy is managed and ephemeral, created per job with explicit identity verification. An SSH tunnel is persistent, manual, and relies on shared keys. One is policy-bound automation; the other is a human shortcut that doesn’t age well.

Can AI tools safely trigger pipelines using TCP Proxies?
Yes, if identity and logging are in place. AI agents or copilots can kick off builds securely while the proxy ensures every connection is traced back to a known token, removing guesswork and risk.

CircleCI TCP Proxies bring predictability to the messy edges of CI/CD networking. Less configuration, fewer tickets, more trust in the process. That is how it should work.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts