All posts

What Compass Jetty Actually Does and When to Use It

You know the feeling. Half your apps talk through one identity provider, a few old ones still cling to LDAP, and a random internal dashboard needs SSH tunneling just to reach it. Then someone says, “Why not run it through Compass Jetty?” and the Slack thread goes quiet. That silence is fair. Compass Jetty sounds simple, but it hides a powerful idea: make every request know who sent it and why without turning engineers into part-time network admins. It bridges secure communication and practical

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You know the feeling. Half your apps talk through one identity provider, a few old ones still cling to LDAP, and a random internal dashboard needs SSH tunneling just to reach it. Then someone says, “Why not run it through Compass Jetty?” and the Slack thread goes quiet.

That silence is fair. Compass Jetty sounds simple, but it hides a powerful idea: make every request know who sent it and why without turning engineers into part-time network admins. It bridges secure communication and practical ops workflow, joining Compass’s identity mapping with Jetty’s proven server layer. Together they turn messy authentication flows into manageable policy rules.

Compass handles who you are—your role, group, and provider context via OIDC or SAML. Jetty handles how traffic gets served, filtered, and inspected. Pair them and you get granular access control at the infrastructure edge, not three layers deep behind a VPN. Think of it as a just-in-time identity-aware proxy that scales with your services instead of slowing them down.

When Compass Jetty runs in your stack, each connection carries identity metadata through the full request lifecycle. The system can check an AWS IAM role, enforce Okta group membership, or verify temporary credentials. Developers no longer create secret-sharing side channels because authorization happens automatically. The result feels like bureaucracy vanished overnight.

Best Practices for Compass Jetty Integration

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Start with clear RBAC mapping. Mirror existing cloud roles rather than inventing new ones. Set token lifetimes short and refresh them through trusted automation, not static configs. If an error appears during handshake, check the identity header propagation before rewriting YAML—it usually lives there.

Real-World Outcomes

  • Faster access setup and fewer manual approvals.
  • Cleaner audit logs with traceable user context.
  • Consistent identity enforcement across internal and external endpoints.
  • Reduced risk from stale credentials or privilege creep.
  • Simpler compliance story, whether for SOC 2 or ISO 27001.

For developers, this means velocity without paranoia. Setup becomes a one-time line item, freeing focus for actual code. CI pipelines can push builds that immediately inherit proper access rules, and onboarding no longer involves 10 Slack messages to security. Less toil, more flow.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of trusting every service owner to remember the right plugin version, identity-aware proxies can be deployed centrally and updated once. It’s clean, auditable, and—best of all—quietly secure.

How do you know Compass Jetty is working?
If your requests authenticate smoothly through your identity provider, log identities show user context, and load times stay flat, it’s working exactly as intended. You feel it not through fanfare but through fewer mistakes.

Compass Jetty is the kind of tooling that earns trust by being invisible. It fades into the background, leaving a trail of secure requests and unbothered engineers.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts