Update the deployment URL
Complete the necessary post-installation configuration, including updating the OAuth application and setting up initial Role-Based Access Control (RBAC). You can then access and sign in to the portal.
Add the deployment URL to the OAuth Application Copy linkLink copied!
When you set up your OAuth application in Ansible Automation Platform before deploying self-service automation portal, you added placeholder text for the Redirect URIs value.
About this task Copy linkLink copied!
You must update this value using the URL from the deployed application so that you can run automation on self-service automation portal from self-service automation portal.
Procedure Copy linkLink copied!
- Determine the
Redirect URIfrom your OpenShift deployment: - Update the
Redirect URIsfield in the OAuth application in Ansible Automation Platform:- In a browser, open your instance of Ansible Automation Platform.
- Navigate to .
- In the list view, click the OAuth application you created.
- Replace the placeholder text in the
Redirect URIsfield with the value you determined from your OpenShift deployment. - Click
Saveto apply the changes.
Configure custom SSL certificates for self-service automation portal Copy linkLink copied!
If your Ansible Automation Platform instance uses custom or self-signed SSL certificates, you must configure self-service automation portal to trust those certificates to avoid SSL verification errors.
Before you begin Copy linkLink copied!
- You have administrator access to your OpenShift Container Platform cluster.
- You have the custom Certificate Authority (CA) certificate file used by your Ansible Automation Platform instance.
- Self-service automation portal is installed in your OpenShift Container Platform cluster.
Procedure Copy linkLink copied!
Results Copy linkLink copied!
- Verify that the self-service automation portal pods are running:
oc get pods -n <namespace>All self-service automation portal pods should show a status of
Running. - Attempt to sign in to self-service automation portal using your Ansible Automation Platform credentials.
If the SSL certificate configuration is correct, you can authenticate successfully without SSL verification errors.
- Check the self-service automation portal logs for SSL-related errors:
oc logs -n <namespace> <pod-name> | grep -i sslIf you see no SSL verification errors, the custom CA certificate is trusted correctly.
If you continue to experience SSL verification errors after following this procedure:
- Verify that the CA certificate file contains the complete certificate chain.
- Ensure that the certificate file is in PEM format.
- Confirm that the Ansible Automation Platform hostname in your configuration matches the hostname in the SSL certificate.
- Check that the
checkSSLparameter in your Helm values is set totrue(the default). Setting it tofalsedisables SSL verification entirely, which is not recommended for production environments.
Sign in to self-service automation portal Copy linkLink copied!
Log in to the deployed self-service automation portal using your existing Ansible Automation Platform credentials. The portal uses these credentials for authentication.
Before you begin Copy linkLink copied!
- You have configured an OAuth application in Ansible Automation Platform for self-service automation portal.
- You have configured a user account in Ansible Automation Platform.
Procedure Copy linkLink copied!
- In a browser, navigate to the URL for self-service automation portal to open the sign-in page.

- Click .
- The sign-in page for Ansible Automation Platform appears:

- Enter your Ansible Automation Platform credentials and click Log in.
- The self-service automation portal web console opens.
If you are using custom or self-signed SSL certificates and when attempting to log in to self-service automation portal, it displays the error:
Login failed; caused by Error: Failed to send POST request: fetch failed
This error indicates that self-service automation portal cannot verify the SSL certificate from your Ansible Automation Platform instance.
To resolve this issue, configure self-service automation portal to trust your custom CA certificate.
While you can disable SSL validation by setting checkSSL: false in the Helm chart configuration, this approach is not recommended for production environments as it reduces security. Instead, configure self-service automation portal to trust your custom CA certificate.
