Juno Upgrades GitHub Integration With OIDC Deployments and Native Sign In

Juno has rolled out an upgraded GitHub integration aimed at simplifying deployments and bringing authentication closer to the workflows developers already use.

The update removes the need for storing static GitHub secrets when deploying through GitHub Actions. Previously, developers were required to generate and manage a JUNO_TOKEN, adding operational overhead and the risk associated with long lived credentials.

The new recommended approach uses OpenID Connect. Instead of relying on a fixed token, GitHub and a Juno Satellite establish a trust relationship. Each workflow run receives short lived credentials that expire automatically once the job is complete. There are no tokens to rotate and no persistent secrets stored in repositories. If a workflow were compromised, there would be no standing credential left behind.

To support the change, Juno has introduced a Deployments screen within its Console interface. Developers can configure which GitHub repositories are authorised to deploy to a given Satellite and review past deployment activity. For those who prefer working from the command line, the same configuration options remain available through the CLI.

Alongside deployment changes, Juno now supports GitHub authentication for applications built on the platform. This allows end users to sign in with their GitHub accounts, a feature that aligns naturally with developer focused products.

Because GitHub does not natively support OpenID Connect for authentication in this context, Juno’s implementation relies on a small self hosted proxy that manages the OAuth exchange. The proxy issues a JSON Web Token after successful authentication. The Satellite verifies the token and creates a session for the user.

The setup requires additional infrastructure. Since the proxy signs tokens using RSA keys, the Satellite must access the corresponding public keys to verify them. Rather than forcing each Satellite to make repeated outbound calls, Juno uses a shared module called Observatory to fetch and cache the keys. Developers self hosting the proxy are also required to deploy their own Observatory instance and configure it to point to the proxy’s key endpoint.

The configuration may demand more effort than plug and play authentication services offered elsewhere. Yet the approach reflects a broader philosophy. Rather than attempting to replicate the full stack CI and CD environments provided by larger cloud platforms, Juno is focusing on tighter integration with tools developers already rely on, particularly GitHub.

The project’s creator acknowledged that building a fully managed deployment platform could be another route. Competing directly with established cloud providers would, however, require sustained infrastructure development and maintenance. For now, the emphasis is on improving compatibility and reducing friction within existing workflows.

For developers building products aimed at other developers, GitHub remains the centre of daily activity. By aligning more closely with that environment, Juno is positioning itself as a platform that adapts to established habits rather than asking teams to rework them.


Dear Reader,

Ledger Life is an independent platform dedicated to covering the Internet Computer (ICP) ecosystem and beyond. We focus on real stories, builder updates, project launches, and the quiet innovations that often get missed.

We’re not backed by sponsors. We rely on readers like you.

If you find value in what we publish—whether it’s deep dives into dApps, explainers on decentralised tech, or just keeping track of what’s moving in Web3—please consider making a donation. It helps us cover costs, stay consistent, and remain truly independent.

Your support goes a long way.

🧠 ICP Principal: ins6i-d53ug-zxmgh-qvum3-r3pvl-ufcvu-bdyon-ovzdy-d26k3-lgq2v-3qe

🧾 ICP Address: f8deb966878f8b83204b251d5d799e0345ea72b8e62e8cf9da8d8830e1b3b05f

Every contribution helps keep the lights on, the stories flowing, and the crypto clutter out.

Thank you for reading, sharing, and being part of this experiment in decentralised media.
—Team Ledger Life

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More like this

Iconfucius v0.3.0 Launches on PyPI With Chain Fusion Trading...

Iconfucius v0.3.0 is now live on PyPI, introducing a command line trading assistant designed for Bitcoin Rune...

Bitcoin’s Last Bear Market Tested Conviction. Investors Now Eye...

Bitcoin’s previous bear market remains fresh in the minds of many long term investors. The downturn that...

SPAR Switzerland Begins Accepting Bitcoin Payments Through DFX Swiss...

Customers at selected SPAR supermarkets across Switzerland can now pay with Bitcoin, following a new integration involving...

Juno has rolled out an upgraded GitHub integration aimed at simplifying deployments and bringing authentication closer to the workflows developers already use.

The update removes the need for storing static GitHub secrets when deploying through GitHub Actions. Previously, developers were required to generate and manage a JUNO_TOKEN, adding operational overhead and the risk associated with long lived credentials.

The new recommended approach uses OpenID Connect. Instead of relying on a fixed token, GitHub and a Juno Satellite establish a trust relationship. Each workflow run receives short lived credentials that expire automatically once the job is complete. There are no tokens to rotate and no persistent secrets stored in repositories. If a workflow were compromised, there would be no standing credential left behind.

To support the change, Juno has introduced a Deployments screen within its Console interface. Developers can configure which GitHub repositories are authorised to deploy to a given Satellite and review past deployment activity. For those who prefer working from the command line, the same configuration options remain available through the CLI.

Alongside deployment changes, Juno now supports GitHub authentication for applications built on the platform. This allows end users to sign in with their GitHub accounts, a feature that aligns naturally with developer focused products.

Because GitHub does not natively support OpenID Connect for authentication in this context, Juno’s implementation relies on a small self hosted proxy that manages the OAuth exchange. The proxy issues a JSON Web Token after successful authentication. The Satellite verifies the token and creates a session for the user.

The setup requires additional infrastructure. Since the proxy signs tokens using RSA keys, the Satellite must access the corresponding public keys to verify them. Rather than forcing each Satellite to make repeated outbound calls, Juno uses a shared module called Observatory to fetch and cache the keys. Developers self hosting the proxy are also required to deploy their own Observatory instance and configure it to point to the proxy’s key endpoint.

The configuration may demand more effort than plug and play authentication services offered elsewhere. Yet the approach reflects a broader philosophy. Rather than attempting to replicate the full stack CI and CD environments provided by larger cloud platforms, Juno is focusing on tighter integration with tools developers already rely on, particularly GitHub.

The project’s creator acknowledged that building a fully managed deployment platform could be another route. Competing directly with established cloud providers would, however, require sustained infrastructure development and maintenance. For now, the emphasis is on improving compatibility and reducing friction within existing workflows.

For developers building products aimed at other developers, GitHub remains the centre of daily activity. By aligning more closely with that environment, Juno is positioning itself as a platform that adapts to established habits rather than asking teams to rework them.


Dear Reader,

Ledger Life is an independent platform dedicated to covering the Internet Computer (ICP) ecosystem and beyond. We focus on real stories, builder updates, project launches, and the quiet innovations that often get missed.

We’re not backed by sponsors. We rely on readers like you.

If you find value in what we publish—whether it’s deep dives into dApps, explainers on decentralised tech, or just keeping track of what’s moving in Web3—please consider making a donation. It helps us cover costs, stay consistent, and remain truly independent.

Your support goes a long way.

🧠 ICP Principal: ins6i-d53ug-zxmgh-qvum3-r3pvl-ufcvu-bdyon-ovzdy-d26k3-lgq2v-3qe

🧾 ICP Address: f8deb966878f8b83204b251d5d799e0345ea72b8e62e8cf9da8d8830e1b3b05f

Every contribution helps keep the lights on, the stories flowing, and the crypto clutter out.

Thank you for reading, sharing, and being part of this experiment in decentralised media.
—Team Ledger Life

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More like this

Iconfucius v0.3.0 Launches on PyPI With Chain Fusion Trading...

Iconfucius v0.3.0 is now live on PyPI, introducing a command line trading assistant designed for Bitcoin Rune...

Bitcoin’s Last Bear Market Tested Conviction. Investors Now Eye...

Bitcoin’s previous bear market remains fresh in the minds of many long term investors. The downturn that...

SPAR Switzerland Begins Accepting Bitcoin Payments Through DFX Swiss...

Customers at selected SPAR supermarkets across Switzerland can now pay with Bitcoin, following a new integration involving...

Juno has rolled out an upgraded GitHub integration aimed at simplifying deployments and bringing authentication closer to the workflows developers already use.

The update removes the need for storing static GitHub secrets when deploying through GitHub Actions. Previously, developers were required to generate and manage a JUNO_TOKEN, adding operational overhead and the risk associated with long lived credentials.

The new recommended approach uses OpenID Connect. Instead of relying on a fixed token, GitHub and a Juno Satellite establish a trust relationship. Each workflow run receives short lived credentials that expire automatically once the job is complete. There are no tokens to rotate and no persistent secrets stored in repositories. If a workflow were compromised, there would be no standing credential left behind.

To support the change, Juno has introduced a Deployments screen within its Console interface. Developers can configure which GitHub repositories are authorised to deploy to a given Satellite and review past deployment activity. For those who prefer working from the command line, the same configuration options remain available through the CLI.

Alongside deployment changes, Juno now supports GitHub authentication for applications built on the platform. This allows end users to sign in with their GitHub accounts, a feature that aligns naturally with developer focused products.

Because GitHub does not natively support OpenID Connect for authentication in this context, Juno’s implementation relies on a small self hosted proxy that manages the OAuth exchange. The proxy issues a JSON Web Token after successful authentication. The Satellite verifies the token and creates a session for the user.

The setup requires additional infrastructure. Since the proxy signs tokens using RSA keys, the Satellite must access the corresponding public keys to verify them. Rather than forcing each Satellite to make repeated outbound calls, Juno uses a shared module called Observatory to fetch and cache the keys. Developers self hosting the proxy are also required to deploy their own Observatory instance and configure it to point to the proxy’s key endpoint.

The configuration may demand more effort than plug and play authentication services offered elsewhere. Yet the approach reflects a broader philosophy. Rather than attempting to replicate the full stack CI and CD environments provided by larger cloud platforms, Juno is focusing on tighter integration with tools developers already rely on, particularly GitHub.

The project’s creator acknowledged that building a fully managed deployment platform could be another route. Competing directly with established cloud providers would, however, require sustained infrastructure development and maintenance. For now, the emphasis is on improving compatibility and reducing friction within existing workflows.

For developers building products aimed at other developers, GitHub remains the centre of daily activity. By aligning more closely with that environment, Juno is positioning itself as a platform that adapts to established habits rather than asking teams to rework them.


Dear Reader,

Ledger Life is an independent platform dedicated to covering the Internet Computer (ICP) ecosystem and beyond. We focus on real stories, builder updates, project launches, and the quiet innovations that often get missed.

We’re not backed by sponsors. We rely on readers like you.

If you find value in what we publish—whether it’s deep dives into dApps, explainers on decentralised tech, or just keeping track of what’s moving in Web3—please consider making a donation. It helps us cover costs, stay consistent, and remain truly independent.

Your support goes a long way.

🧠 ICP Principal: ins6i-d53ug-zxmgh-qvum3-r3pvl-ufcvu-bdyon-ovzdy-d26k3-lgq2v-3qe

🧾 ICP Address: f8deb966878f8b83204b251d5d799e0345ea72b8e62e8cf9da8d8830e1b3b05f

Every contribution helps keep the lights on, the stories flowing, and the crypto clutter out.

Thank you for reading, sharing, and being part of this experiment in decentralised media.
—Team Ledger Life

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More like this

Iconfucius v0.3.0 Launches on PyPI With Chain Fusion Trading...

Iconfucius v0.3.0 is now live on PyPI, introducing a command line trading assistant designed for Bitcoin Rune...

Bitcoin’s Last Bear Market Tested Conviction. Investors Now Eye...

Bitcoin’s previous bear market remains fresh in the minds of many long term investors. The downturn that...

SPAR Switzerland Begins Accepting Bitcoin Payments Through DFX Swiss...

Customers at selected SPAR supermarkets across Switzerland can now pay with Bitcoin, following a new integration involving...

Juno has rolled out an upgraded GitHub integration aimed at simplifying deployments and bringing authentication closer to the workflows developers already use.

The update removes the need for storing static GitHub secrets when deploying through GitHub Actions. Previously, developers were required to generate and manage a JUNO_TOKEN, adding operational overhead and the risk associated with long lived credentials.

The new recommended approach uses OpenID Connect. Instead of relying on a fixed token, GitHub and a Juno Satellite establish a trust relationship. Each workflow run receives short lived credentials that expire automatically once the job is complete. There are no tokens to rotate and no persistent secrets stored in repositories. If a workflow were compromised, there would be no standing credential left behind.

To support the change, Juno has introduced a Deployments screen within its Console interface. Developers can configure which GitHub repositories are authorised to deploy to a given Satellite and review past deployment activity. For those who prefer working from the command line, the same configuration options remain available through the CLI.

Alongside deployment changes, Juno now supports GitHub authentication for applications built on the platform. This allows end users to sign in with their GitHub accounts, a feature that aligns naturally with developer focused products.

Because GitHub does not natively support OpenID Connect for authentication in this context, Juno’s implementation relies on a small self hosted proxy that manages the OAuth exchange. The proxy issues a JSON Web Token after successful authentication. The Satellite verifies the token and creates a session for the user.

The setup requires additional infrastructure. Since the proxy signs tokens using RSA keys, the Satellite must access the corresponding public keys to verify them. Rather than forcing each Satellite to make repeated outbound calls, Juno uses a shared module called Observatory to fetch and cache the keys. Developers self hosting the proxy are also required to deploy their own Observatory instance and configure it to point to the proxy’s key endpoint.

The configuration may demand more effort than plug and play authentication services offered elsewhere. Yet the approach reflects a broader philosophy. Rather than attempting to replicate the full stack CI and CD environments provided by larger cloud platforms, Juno is focusing on tighter integration with tools developers already rely on, particularly GitHub.

The project’s creator acknowledged that building a fully managed deployment platform could be another route. Competing directly with established cloud providers would, however, require sustained infrastructure development and maintenance. For now, the emphasis is on improving compatibility and reducing friction within existing workflows.

For developers building products aimed at other developers, GitHub remains the centre of daily activity. By aligning more closely with that environment, Juno is positioning itself as a platform that adapts to established habits rather than asking teams to rework them.


Dear Reader,

Ledger Life is an independent platform dedicated to covering the Internet Computer (ICP) ecosystem and beyond. We focus on real stories, builder updates, project launches, and the quiet innovations that often get missed.

We’re not backed by sponsors. We rely on readers like you.

If you find value in what we publish—whether it’s deep dives into dApps, explainers on decentralised tech, or just keeping track of what’s moving in Web3—please consider making a donation. It helps us cover costs, stay consistent, and remain truly independent.

Your support goes a long way.

🧠 ICP Principal: ins6i-d53ug-zxmgh-qvum3-r3pvl-ufcvu-bdyon-ovzdy-d26k3-lgq2v-3qe

🧾 ICP Address: f8deb966878f8b83204b251d5d799e0345ea72b8e62e8cf9da8d8830e1b3b05f

Every contribution helps keep the lights on, the stories flowing, and the crypto clutter out.

Thank you for reading, sharing, and being part of this experiment in decentralised media.
—Team Ledger Life

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More like this

Iconfucius v0.3.0 Launches on PyPI With Chain Fusion Trading...

Iconfucius v0.3.0 is now live on PyPI, introducing a command line trading assistant designed for Bitcoin Rune...

Bitcoin’s Last Bear Market Tested Conviction. Investors Now Eye...

Bitcoin’s previous bear market remains fresh in the minds of many long term investors. The downturn that...

SPAR Switzerland Begins Accepting Bitcoin Payments Through DFX Swiss...

Customers at selected SPAR supermarkets across Switzerland can now pay with Bitcoin, following a new integration involving...