Update the deployment URL
Complete the necessary post-installation configuration, including updating the OAuth application and setting up initial Role-Based Access Control (RBAC). You can then access and sign in to the portal.
Add the deployment URL to the OAuth Application Copy linkLink copied!
When you set up your OAuth application in Ansible Automation Platform before deploying Ansible automation portal, you added placeholder text for the Redirect URIs value.
About this task Copy linkLink copied!
You must update this value using the URL from the deployed application so that you can run automation on Ansible automation portal from Ansible automation portal.
Procedure Copy linkLink copied!
- Determine the
Redirect URIfrom your OpenShift deployment: - Update the
Redirect URIsfield in the OAuth application in Ansible Automation Platform:- In a browser, open your instance of Ansible Automation Platform.
- Navigate to .
- In the list view, click the OAuth application you created.
- Replace the placeholder text in the
Redirect URIsfield with the value you determined from your OpenShift deployment. - Click
Saveto apply the changes.
Configure custom SSL certificates for the Ansible automation portal Copy linkLink copied!
If your Ansible Automation Platform instance uses custom or self-signed SSL certificates, configure the Ansible automation portal to trust those certificates to prevent authentication failures.
Before you begin Copy linkLink copied!
- You have administrator access to your Red Hat OpenShift Container Platform cluster.
- You have the custom Certificate Authority (CA) certificate file used by your Ansible Automation Platform instance.
- The Ansible automation portal is installed in your Red Hat OpenShift Container Platform cluster.
Procedure Copy linkLink copied!
Results Copy linkLink copied!
- Verify that the Ansible automation portal pods are running:
$ oc get pods -n <namespace>All Ansible automation portal pods should show a status of
Running. - Attempt to sign in to the Ansible automation portal using your Ansible Automation Platform credentials.
If the SSL certificate configuration is correct, you can authenticate successfully without SSL verification errors.
- Check the Ansible automation portal logs for SSL-related errors:
$ oc logs -n <namespace> <pod-name> | grep -i sslIf you see no SSL verification errors, the custom CA certificate is trusted correctly.
If you continue to experience SSL verification errors after following this procedure:
- Verify that the CA certificate file contains the complete certificate chain.
- Ensure that the certificate file is in PEM format.
- Confirm that the Ansible Automation Platform hostname in your configuration matches the hostname in the SSL certificate.
- Check that the
checkSSLparameter in your Helm values is set totrue(the default). Setting it tofalsedisables SSL verification entirely, which is not recommended for production environments.
Sign in to Ansible automation portal Copy linkLink copied!
Log in to the deployed Ansible automation portal using your existing Ansible Automation Platform credentials. The portal uses these credentials for authentication.
Before you begin Copy linkLink copied!
- You have configured an OAuth application in Ansible Automation Platform for Ansible automation portal.
- You have configured a user account in Ansible Automation Platform.
Procedure Copy linkLink copied!
- In a browser, navigate to the URL for Ansible automation portal to open the sign-in page.

- Click .
- The sign-in page for Ansible Automation Platform appears:

- Enter your Ansible Automation Platform credentials and click Log in.
- The Ansible automation portal web console opens.
If you are using custom or self-signed SSL certificates and when attempting to log in to Ansible automation portal, it displays the error:
Login failed; caused by Error: Failed to send POST request: fetch failed
This error indicates that Ansible automation portal cannot verify the SSL certificate from your Ansible Automation Platform instance.
To resolve this issue, configure Ansible automation portal to trust your custom CA certificate.
While you can disable SSL validation by setting checkSSL: false in the Helm chart configuration, this approach is not recommended for production environments as it reduces security. Instead, configure Ansible automation portal to trust your custom CA certificate.
