Seqera Platform Feature Requests

Anonymous

Feature requests for the Seqera Platform (https://cloud.seqera.io)
Managed (AKA passthrough) identity for all Seqera-supported infra providers
We’d love to see Seqera Platform support cloud identity passthrough, allowing pipelines to securely access cloud resources (like storage, compute, secrets) using native identity mechanisms from AWS, Azure, and GCP — without needing to manage long-lived credentials. (Seqera Platform already supports this for HPC). This would allow access to cloud services to be governed directly by cloud IAM policies, improving both security and enterprise integration. Why this matters Today, jobs typically authenticate to cloud services using infrastructure-level credentials (e.g., an IAM role or service principal attached to the compute environment). These credentials are: Shared across users Often over-permissioned Not user-aware — cloud services can’t tell who requested access This limits enterprises from applying their existing IAM policies and can create operational or audit complexity. ✅ What we’re asking for Enable Seqera Platform to support cloud-native, credential-less authentication, such as: AWS: IAM Roles with identity federation (e.g., via IAM Identity Center or OIDC) Azure: System- and user-assigned Managed Identities GCP: Workload Identity Federation tied to user or workspace context This would allow: Per-user or per-pipeline IAM role/identity selection Fine-grained access controls to cloud resources, managed entirely in the cloud provider’s IAM system Removal of static secrets (like service principal keys or access tokens)
4
·

acknowledged

Make the user access allow list configurable in the application itself
Using public OpenID identity providers such as Google or GitHub to authenticate with Seqera Platform Enterprise is severely hampered by the inconvenient user management. While a user access allow-list can be used to restrict access to specific email addresses or domains, this list is currently only configurable via environment variables or the tower.yml configuration file ( https://docs.seqera.io/platform/24.1/enterprise/configuration/authentication#configure-user-access-allow-list ) As a result, any changes to the allowed users require administrative access to the server and a restart of the application. In large organizations like universities, the response times of central IT services are typically slow, making the onboarding of new users a process that can take weeks. For short-term users, such as interns or master’s students, gaining access is quite impractical or even impossible before their time at the organization ends. Therefore, it would be beneficial for organization owners on the Seqera Platform to have the ability to manage the allow-list directly through the user interface. Additionally, we have observed that the current allow-list functionality on the Seqera Platform can be too restrictive for users with multiple email addresses linked to their OpenID identity provider. For instance, we recently encountered a case where a user’s primary GitHub email was included in the allow-list, yet access was denied because their secondary email was not. If changes to the allow-list could be made quickly via Seqera Platform's user interface, this issue could have been resolved promptly. However, the weeks-long delay in implementing a change made it particularly frustrating that a user, whose primary GitHub email was already on the allow-list, still could not authenticate. Thank you for your understanding and implementation!
1
·

acknowledged

Load More