Curity devOps dashboard

DevOps Dashboard User Administration

On this page

The DevOps Dashboard concepts article explains the role of the DevOps dashboard. It enables groups of employees to administer the identity and access management (IAM) system, with different permissions. The dashboard also enables you to list, create and edit customer users, in a visual and productive manner. This tutorial shows how to get up and running, and explains the authorization concepts.

The Curity Identity Server does not enable the DevOps Dashboard by default. To do so, first ensure that you have a valid license file, such a trial license with access to the dashboard feature and at least 3 user groups. This tutorial will start from the default Docker based setup and manage customer users in a SQL data source.

Example Deployment

The GitHub repository at the top of this page can be used to quickly run a working setup. Clone the repo, then copy the license.json file to the root folder and run the deployment script:


Next, login to the Admin UI with the following details, to view configuration settings. The default deployment of the Curity Identity Server uses self-signed certificates, so first ignore the browser warning and proceed to the Admin UI when prompted.

  • URL: https://localhost:6749/admin
  • Admin UI credentials: admin / Password1

In the example deployment there are two employee groups, summarized below. When required, the DevOps dashboard and its authorization can scale to many teams in a large organization.

devopsFull permissions, including listing, editing and creating customer user accounts
developersPermissions to edit some OAuth clients, and to troubleshoot problems via alarms

You can login to the DevOps dashboard with either of these details:

  • URL: https://localhost:6749/admin/dashboard
  • DevOps user: johndoe
  • Developer user: janedoe

After login, the devops user has full access to customer user details:

Users List

This tutorial will walk through how the example deployment was configured. You can then apply similar configuration to your own system.

Initial Setup

First an empty Docker based deployment was run, as explained in Install using Docker. Next, a username authenticator was created, for employees, as explained in Configure an Authenticator:

Username Authenticator

In the Admin UI, navigate to System -> Admin Service. The RESTCONF API is required, and also the DevOps Dashboard option. When the dashboard option is selected, the following prompt is presented, where the token service and authenticator are configured:

Enable Dashboard

Both the Admin UI and runtime node must use the same HTTP or HTTPS scheme. Under System -> Deployment, the service role in the example setup uses HTTPS and a keystore:

HTTP Runtime Node

Initial Dashboard Login

A new entry is then provided in the top level menu, to allow dashboard logins:

Dashboard Enabled

This results in two admin URLs for the Curity Identity Server:

User InterfaceURL
Admin UIhttps://localhost:6749/admin
DevOps Dashboardhttps://localhost:6749/admin/dashboard

When you select a dashboard login, an OAuth flow is run, and it is possible to authenticate in many ways. A popup window is used for the login, so you must ensure that the browser allows popups for the domain of the Curity Identity Server:

Initial Login

When using the example deployment, login as the johndoe or janedoe test users. For a new Docker deployment, use the default admin user instead. You then get access to initial dashboard features, such as creating clients. At this point you are up and running in a basic way, but user administration is not configured yet:

Admin Authenticated

Employee Groups

Employees who manage the Curity Identity Server should always use a different authenticator to your customer users. Often this will be an identity provider (IDP) from your cloud platform, such as Azure Active Directory. That system can provide some kind of employee role or group attribute. The example deployment simulates this by setting a role attribute in an authentication action, that runs after the username is submitted:

function result(context) {
var attributes = context.attributeMap;
if (attributes.subject === 'johndoe') {
attributes.role = 'devops';
if (attributes.subject === 'janedoe') {
attributes.role = 'developer';
return attributes;

Administrator User Types

For convenience, the Curity Identity Server provides a default admin user. This is then saved to the XML configuration during backups. It is possible to add new users that are managed in this way, and to associate groups and permissions to them, as explained in the Access Control Rules tutorial.

Built In Users

In many real-world setups, administrators instead originate from an external system or data source. It is important to understand the type of administrator user, since this affects how groups are used for authorization, described later in this tutorial.

Enable User Management

The users managed in the dashboard will be customer users. In the example deployment a SQL database is used, which is pre-shipped with two users, named bob and alice. These users would typically login to your web and mobile apps.

Users Data Source

A user management profile was created, from the home screen of the Admin UI, and the dashboard authorization manager was selected. This controls access to customer user accounts.

User Management Authorization

Under the Endpoints page of the user management profile, a GraphQL endpoint is configured, since the DevOps dashboard uses this API to read and write customer user accounts:

GraphQL Endpoint

The example setup enables credential management on the Data Sources page of the user management profile. This enables passwords to be stored for customer users, for scenarios where they sign in with a username and password:

Credential Management

Dashboard Groups and Permissions

Under System -> Administrators -> DevOps, three groups were created:

User Groups

The admin and devops groups are granted full dashboard permissions, whereas the developers group only has access to edit OAuth clients:

developer permissions

Populate the Groups Claim

In the example deployment, navigate to System -> Authorization to see the configured levels of access to customer user accounts. Notice that members of the developers group have no access:

User Access Levels

When a user logs in to the DevOps dashboard, a groups claim is issued in the access token returned to the dashboard OAuth client. This is then mapped to the above access levels.

Groups Claim Types

The two types of group claim are summarized in the following table, for the two types of administrator user:

User TypeGroups Claim Name
Users saved to XML Configurationurn:se:curity:claims:admin:groups
Users from an external system or data sourcegroups

When logging into the dashboard with the built-in admin user, the first type of group claim is used. For the example DevOps and developer users, the second type of group claim is used.

Groups Claim Evaluation

The DevOps dashboard uses a generated OAuth client named devops_dashboard_restconf_client. This uses the following scope:

openid urn:se:curity:scopes:admin:api

To make the DevOps dashboard work for the example employee users, navigate to Token Service -> Clients. In the token designer window, add a new groups claim, add it to the above scope, then drag the scope into the access token pane:

Token Designer

The runtime value of the groups claim is set by a subject claims provider. This provides access to the role property set in the authentication action that ran after the example deployment's username authenticator. The role is then translated to a groups claim to be issued to the access token:

Groups Claim Value

OAuth Troubleshooting

The example resources include some technical notes on the dashboard client's OAuth flow. This can be followed to troubleshoot logins and diagnose unexpected group claim values returned to the dashboard. Once you have a working setup, the access token for the developer user will have a payload similar to this:

"sub": "janedoe",
"purpose": "access_token",
"iss": "https://localhost:8443/oauth/v2/oauth-anonymous",
"active": true,
"groups": [
"type": "",
"value": "developers",
"primary": true
"token_type": "bearer",
"client_id": "devops_dashboard_restconf_client",
"aud": [
"nbf": 1671185832,
"scope": "openid urn:se:curity:scopes:admin:api",
"exp": 1671186132,
"delegationId": "acbb74b4-7d7c-4723-9f4e-eb1af497b950",
"iat": 1671185832

Deployment Pipelines

All of the above configuration should only be done once, typically in a development stage of the pipeline. You can then use parameterized configuration to promote the same setup to other stages of your pipeline. This involves use of shared configuration XML with placeholders:

<client-name>DevOps Dashboard Client</client-name>
<description>The OAuth client that is used to login to the DevOps dashboard.</description>
<code />


This tutorial showed how to get up and running with the DevOps dashboard, starting from a default docker deployment of the Curity Identity Server. The dashboard provides a productive and secure way for employees to manage customer user accounts. It also enables you to distribute security management across teams in your organization.