This guide walks through the C1 federation wizard to create a provider and trust. Before starting, you need a service principal — if you don’t have one yet, follow Step 1 of the client credentials quick start. You don’t need to create a credential; federation replaces credentials with OIDC tokens.Documentation Index
Fetch the complete documentation index at: https://conductorone-docs-ad-account-provisioning-setup.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Create a federation trust
Choose a provider. Select an existing provider, or create a new one. C1 includes presets for common platforms:
| Provider | Issuer URL | Notes |
|---|---|---|
| GitHub Actions | https://token.actions.githubusercontent.com | Fixed issuer URL |
| GitLab CI/CD | https://gitlab.com (or self-managed URL) | Editable issuer URL |
| HCP Terraform | https://app.terraform.io (or custom hostname) | Editable issuer URL |
| AWS IAM Outbound | Account-specific issuer URL | Editable issuer URL |
| Custom OIDC | Any HTTPS issuer URL | For other OIDC-capable platforms |
Configure the trust. The wizard generates a CEL expression based on your inputs (organization, repository, branch, environment, and so on). You can switch to manual mode to write your own CEL expression.Optional. Add IP restrictions and scoped roles for additional security. See security controls for details.
Test your token
Before deploying to production, test the federation trust to make sure your CEL expression matches the expected JWT claims.The test runner validates each step:
| Step | What it checks |
|---|---|
| JWT decode | Token is valid JWT format |
| Issuer match | Token issuer matches the provider |
| Signature validation | Token signature is valid via JWKS |
| Audience validation | Token audience matches your tenant |
| Token freshness | Token was issued within the last 10 minutes |
| CEL evaluation | Your condition expression returns true |
| IP address check | Source IP is in the allowlist (if configured) |
Platform-specific guides
Once your trust is created, follow the integration guide for your CI/CD platform:- GitHub Actions — recommended for GitHub-based workflows
- GitLab CI — uses GitLab’s built-in
id_tokens - HCP Terraform — auto-detected from workspace identity tokens
- AWS IAM — outbound identity federation from any AWS workload
- Custom OIDC — any platform with OIDC support