Group mapping
OIDC groups feed Traefik middlewares and admin sessions, keeping least-privilege in place.
Identity & Access
The identity provider anchors role-based access for the admin console, docs MCP, and future automation agents. Deployment guardrails track issuer health, TLS posture, and allowed groups inside the status ledger.
Identity hooks pair with forward-auth middleware so every sensitive surface inherits the same policies.
OIDC groups feed Traefik middlewares and admin sessions, keeping least-privilege in place.
Let’s Encrypt certificates are reissued automatically, and ops/checks.sh alerts on issuer drift.
Workspace prep snapshots note provisioning changes, while docs/social surfaces echo each deploy.
We stage identity alongside the MCP gateway so automations and humans share the same login posture.