The first time someone links Drone CI to an identity provider, it usually goes fine—until it doesn’t. A token expires, a permission goes missing, or the wrong user suddenly owns a build. Most teams then ask the same question: how do we make Drone OneLogin behave predictably every time?
Drone is the automation backbone. It runs builds, signs containers, and deploys code with every push. OneLogin is the gatekeeper, handling single sign-on, MFA, and user provisioning. Combined, they control who can kick off a pipeline and how the environment inherits identity. Done right, it means zero password sharing and full traceability. Done sloppy, it invites shadow credentials and “just-for-now” access hacks.
The integration hinges on OpenID Connect (OIDC). Drone signals OneLogin during authentication, asking for an access token tied to a verified identity. That token maps to roles in Drone’s database, effectively linking your workforce directory to your build agents. All authentication happens through OneLogin, while Drone enforces repository-level permissions. You get central policy, decentralized execution, and fewer 3 a.m. Slack pings about broken webhooks.
A clean Drone OneLogin setup usually looks like this: configure OIDC in Drone’s settings, enable SSO in OneLogin with the matching redirect URL, and define user roles—viewer, maintainer, admin—through group claims. The rest is policy, not plumbing. Keep token lifetimes short, rotate secrets automatically, and disable anonymous access to your Drone server. Most issues come down to mismatched callback URLs or outdated certificates, both fixable in minutes if you know where to check.
Quick answer: To connect Drone with OneLogin, register Drone as an OIDC app in OneLogin, provide its redirect URL, obtain client credentials, and enable SSO in Drone’s configuration. Authentication then routes through OneLogin, ensuring every pipeline execution maps to a verified identity.