You have microservices running in five clouds, a dozen engineers deploying every hour, and a compliance audit breathing down your neck. You need to know who accessed what, when, and under which identity. That is where Harness Pulsar steps in. It keeps your deployment pipelines secure and observable without slowing anyone down.
Harness Pulsar acts as the identity-aware access layer inside Harness, bridging your CI/CD workflows with your organization’s authentication stack. It wraps every command, approval, and deployment in a verified identity context. Instead of granting long-lived credentials, Pulsar uses just-in-time policies, short-lived tokens, and native identity federation. It’s what AWS IAM wished it could do for ephemeral build infrastructure.
When you plug Pulsar into your pipelines, it doesn’t rewrite your configs or twist your secrets around. It simply replaces static credentials with dynamic access that lives and dies alongside the job. Imagine OIDC tokens minted on demand, traceable back to your Okta groups, cleaned up right after execution. That’s how Pulsar ensures zero standing privileges and full auditability.
Integration workflow
Pulsar authenticates via your existing IdP, injects a scoped identity into each job, and lets Harness orchestrate resources against that temporary trust. Every step can map to least‑privilege roles through AWS IAM or Kubernetes RBAC. The result is predictable and compliant automation without manual approvals clogging Slack.
Best practices
Keep token TTLs short. Treat every pipeline action as a privilege request. Rotate signing keys on schedule. Use Pulsar’s logs to confirm every identity‑to‑resource mapping. If something breaks, it’s usually an expired key or outdated group mapping, not black magic.