You can’t scale access control by email threads and guesswork. At some point every infrastructure team hits a wall: too many systems, too many approvals, and too little traceability. That’s where Clutch and Jetty come into play. Together they turn messy ops requests into fast, secure workflows that actually respect policy.
Clutch is an open-source platform from Lyft built to automate operational tasks for engineers. It wraps complex actions like provisioning or approval in a clean user interface. Jetty is a lightweight Identity-Aware Proxy, mixing authentication and authorization at the request layer. Pair them and you get a self-service model that’s both efficient and compliant. Engineers get speed, security teams get control, and audit logs stop looking like ransom notes.
The Clutch Jetty integration works by sitting Jetty in front of Clutch’s service endpoints. Jetty validates identity through OIDC, usually using providers like Okta or Google Workspace. Once verified, role-based permissions move downstream to Clutch, which executes the approved workflow. The real magic is in the data plane: every request carries a signed token so identity never gets lost in transit. You get fine-grained control over who can trigger what, without needing custom ACLs for each microservice.
A few best practices make this pairing shine. Keep your Jetty configuration declarative and source-controlled. Rotate tokens periodically with AWS Secrets Manager or Vault to stay SOC 2 compliant. Map Clutch actions to grouped roles, not individuals. And when troubleshooting, remember: if a user is locked out, start with the OIDC configuration file before touching anything in Clutch.
Here’s what that yields in practice: