Console
Configure governance, identity, and access control for your Keycard deployment.
Without centralized policy, teams fall back to approving every action manually or letting agents run unchecked. Console is where you replace that tradeoff with rules that enforce themselves. Author them in versioned sets, roll back to any previous state.
With Console, you can:
- Write permit/forbid policies that evaluate every request, with safe rollback to any previous version
- Bring your own IdP so users authenticate through Okta, Auth0, or Google
- Assign roles scoped to the organization or individual zones
- Add Gmail, GitHub, Slack, and other APIs from the Resource Catalog
- Gate Console access behind your corporate SSO
Get Started
Section titled “Get Started”GET STARTED
Set up your identity provider, from app creation to first login.
Reference
Section titled “Reference”CONFIGURATION
Each area of Console with setup steps and examples.
Governance PoliciesIndividual permit/forbid rules and policy sets that control access across a zoneIdentity ProvidersConnect your own OAuth 2.0 IdP for zone-level user authenticationZone AuthenticationConfiguring zone authentication, inviting users, sign up, and troubleshootingRoles & PermissionsOrganization and zone roles that control who can manage settings and resourcesSingle Sign-OnOIDC-based SSO for your team’s access to Keycard Console, with JIT provisioningResource CatalogPre-configured integrations for Gmail, GitHub, Slack, and more, ready to add to your zone