Your internal developer portal looks great until someone clicks “request access” and the workflow vanishes into Slack. That’s where logic breaks down. Backstage JSON-RPC ties the portal into the real systems that grant or audit access. No more guesswork, no more tickets lost in the shuffle. It converts clicks into trusted, traceable actions.
Backstage is the control panel for your engineering org. JSON-RPC is the protocol that gives it superpowers. It’s a lightweight, stateless way to call methods over HTTP without dragging in the overhead of REST or GraphQL. When you pair the two, you get service actions that feel local but execute anywhere securely. JSON-RPC in Backstage lets the frontend talk to backend plugins the same way your CLI talks to a remote agent.
Here’s the basic workflow. A user, verified through OIDC or SAML, triggers an event in Backstage. The frontend sends a JSON-RPC request to a backend handler. That handler knows which identity made the call and what permissions are attached, often mapped through AWS IAM or Okta roles. The handler performs the action, returns structured data, and logs the transaction. Every request has a clear caller, method, and result.
Errors stay honest too. JSON-RPC’s simple envelope makes it easy to log both failures and context without leaking tokens or stack traces. If requests start failing, you know whether it’s a missing permission or a bad downstream system—not a mystery “something went wrong.”
How do I connect Backstage JSON-RPC to my existing identity system?
Use whatever provider already issues verified tokens. Backstage consumes OIDC claims, so your RPC calls automatically inherit identity. No separate API keys, no secret-copying sprawl.