Picture a build pipeline waiting around for secrets like it’s stuck behind a velvet rope. No credentials, no deploy. Most DevOps teams solve this with service accounts or long-lived access tokens. CircleCI Pulsar offers something cleaner: short-lived, identity-bound tokens that give jobs precise, time-boxed permission to reach protected systems.
CircleCI handles continuous integration and delivery. Pulsar, its secure access broker, issues credentials that disappear as soon as a job ends. This removes the “key under the mat” problem where credentials linger in logs or config files. Together they create CI workflows that move fast without trading away security.
In a typical setup, Pulsar connects CircleCI jobs to cloud environments that require authentication, such as AWS, GCP, or Kubernetes. When a workflow runs, Pulsar authenticates through your identity provider—usually via OIDC—then requests a scoped token on behalf of that one build. The token lives just long enough to finish the task, then expires before anyone can reuse it. The effect is like giving each job its own disposable passport.
How do I connect CircleCI and Pulsar?
You integrate Pulsar by linking CircleCI’s OIDC identity with Pulsar’s access policy. Each job inherits identity claims, and Pulsar issues credentials dynamically through a trusted provider. You map roles in your IAM system, such as AWS IAM or GCP Workload Identity, to those claims. No manual key rotation, no shared secrets.
To troubleshoot, confirm your identity provider (Okta, Azure AD, etc.) trusts CircleCI’s OIDC issuer and that downstream policies reference the correct claims. One missing subject field is often the silent culprit.