You have a clean pipeline, a steady build, and a half-dozen developers waiting on access. Someone broke the permissions again. Compass TeamCity exists to stop that spiral — mapping your software components to builds and teams so automation doesn’t trip over access controls.
Compass gives structure to your architecture, linking services, owners, and dependencies. TeamCity runs continuous integrations that decide what ships and when. Together, they create a tightly visible feedback loop: who built it, where it lives, and how to deploy it safely. This combo turns opaque DevOps pipelines into transparent systems anyone can reason about.
How the integration actually works
Compass sends metadata and ownership context downstream, while TeamCity handles job execution and build states. The integration syncs repository and service tags through API calls authenticated via OIDC, ensuring your build server never trusts stale tokens or mystery users. Once paired, a failed policy or missing tag doesn’t block the pipeline — it tells you exactly which team owns the fix.
In practice, you assign each Compass component an owner group that mirrors your IAM provider, such as Okta or AWS IAM. TeamCity jobs reference those identities for deployment and notification, giving you human-readable build histories linked to real accountability. Auditing becomes a conversation, not a scavenger hunt.
Common best practices
- Rotate service credentials every 90 days or automate that rotation through your identity provider.
- Map feature branches to Compass components rather than entire repositories to reduce build scope.
- Use TeamCity build parameters to include ownership metadata in test logs for faster debugging.
- Keep the integration tokens short-lived and scoped by project, never global.
Those small steps prevent the two systems from becoming a tangled mess of outdated permissions.