TheDocumentation Index
Fetch the complete documentation index at: https://conductorone-groman-network-requirements-updates.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
conductorone/oidc-token-action GitHub Action exchanges a GitHub Actions OIDC token for a C1 access token in a single step. No secrets to store or rotate.
Prerequisites
- A service principal with a GitHub Actions federation trust. See set up federation if you haven’t created one yet.
- The trust’s client ID (for example
swift-otter-19384@yourcompany.conductor.one/wfe)
Set up the workflow
Add the action to your workflow file. Your workflow must haveid-token: write permission for GitHub to issue the OIDC token.
- Requests a GitHub OIDC token with your tenant domain as the audience
- Exchanges it for a C1 access token via token exchange
- Exports
CONDUCTORONE_ACCESS_TOKENandCONDUCTORONE_CLIENT_IDas environment variables - Masks the token in logs to prevent accidental exposure
- Cleans up the environment variables when the job finishes
Use with downstream tools
After the action runs,CONDUCTORONE_ACCESS_TOKEN is available to all subsequent steps. Every C1 tool recognizes this variable automatically.
Cone CLI
Terraform
Direct API calls
CEL expression examples
When creating the federation trust, the CEL expression controls which GitHub Actions workflows can authenticate. The expression evaluates against the GitHub OIDC token’s claims.Restrict to a repository
Restrict to a repository and branch
Restrict to a repository and environment
Common GitHub OIDC claims
| Claim | Example value | Description |
|---|---|---|
repository | acme/infra | Owner and repository name |
repository_owner | acme | Repository owner (organization or user) |
ref | refs/heads/main | Git ref that triggered the workflow |
environment | production | GitHub Environment name (if used) |
job_workflow_ref | acme/infra/.github/workflows/deploy.yml@refs/heads/main | Full workflow file reference |
actor | octocat | GitHub user who triggered the run |
event_name | push | Event that triggered the workflow |
Security best practices for GitHub Actions
For maximum security, pin to a specific reusable workflow viajob_workflow_ref:
id-token: write permission.