Skip to content

Commit e38c6a8

Browse files
authored
Update workflow heading
1 parent fdfd9b7 commit e38c6a8

1 file changed

Lines changed: 8 additions & 0 deletions

File tree

content/actions/security-for-github-actions/security-hardening-your-deployments/configuring-openid-connect-in-octopus-deploy.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,14 @@ To use OIDC with Octopus Deploy, first establish a trust relationship between {%
3636
1. Create or open the Service Account that will be granted access via the token request.
3737
1. Configure a new OIDC Identity, defining the relevant subject that the {% data variables.product.prodname_actions %} workflow token request will be validated against.
3838

39+
## Updating your {% data variables.product.prodname_actions %} workflow
40+
41+
To update your workflows for OIDC, you will need to make two changes to your YAML:
42+
1. Add permissions settings for the token.
43+
1. Use the [`OctopusDeploy/login`](https://github.com/OctopusDeploy/login) action to exchange the OIDC token (JWT) for a cloud access token.
44+
45+
{% data reusables.actions.oidc-deployment-protection-rules %}
46+
3947
### Adding permissions settings
4048

4149
{% data reusables.actions.oidc-permissions-token %}

0 commit comments

Comments
 (0)