Configuring Authentication Settings
TeamCity can authenticate users via an internal database, or can integrate into your system and use external authentication sources such as Windows Domain or LDAP.
Authentication is configured on the Administration | Authentication page; the currently used authentication modules are also displayed here.
TeamCity provides several preconfigured authentication options (presets) to cover the most common use-case described below. The presets are combinations of authentication modules supported by TeamCity: three credentials authentication modules and two HTTP authentication modules:
- Credentials Authentication Modules
- HTTP Authentication Modules
When you first log in to TeamCity, the default authentication including the Built-in and Basic HTTP Authentication modules is enabled and editing authentication settings in the simple mode is active.
To modify the existing settings, click the Edit link in the table next to the description of the enabled authentication module.
To switch to a different preconfigured scheme, use the Load preset button. For more options, switch to the Advanced mode.
Simple mode (default) allows you to select presets created for the most common use cases. To override the existing authentication settings, use the Load preset... button, select one of the options and Save your changes. The following presets are available:
TeamCity allows enabling several authentication modules simultaneously using the advanced mode in the TeamCity web UI.
When a user attempts to log in, all the modules will be tried one by one. If one of them authenticates the user, the login will be successful; if all of them fail, the user will not be able to log into TeamCity.
It is possible to use a combination of internal and external authentication. The recommended approach is to configure LDAP Integration for your internal employees first and then to add Built-in authentication for external users.
Switch to advanced mode with the corresponding link on the Administration | Authentication page.
Click Add Module and select a module from the drop-down.
Use the properties available for modules by selecting/deselecting checkboxes in the Add Module dialog.
Click Apply and Save your changes.
Also, TeamCity plugins can provide additional authentication modules.
User Authentication Settings
The very first time TeamCity server starts with no users (and no administrator) so you will be prompted for the administrator account. If you are not prompted for the administrator account, refer to How To Retrieve Administrator Password for a resolution.
The TeamCity administrator can modify the authentication settings for every user on their profile page.
The TeamCity list of users and authentication modules just map external credentials to the users. This means that a single TeamCity user can authenticate using different modules, provided the entered credentials are mapped to the same TeamCity user. Authentication modules have a configuration on how to map external user data to a TeamCity user, and some (Windows Domain, JetBrains Hub) allow editing the external user linking data on the TeamCity user profile.
Handling of the user mapping by the bundled authentication modules:
Built-in authentication stores a TeamCity-maintained password for each user
Windows Domain authentication allows specifying the default domain and assumes the Domain account name is equal to the TeamCity user. The domain account can be edited on the user profile page
LDAP Integration allows setting LDAP property to get TeamCity username from user's LDAP entry
Care should be taken when modifying authentication settings: there can be a case when the administrator cannot login after changing authentication modules:
Let's imagine that the administrator had the "jsmith" TeamCity username and used the default authentication. Then the authentication module was changed to Windows domain authentication (i.e. Windows domain authentication module was added and the default one was removed). If, for example, the Windows domain username of that administrator is "john.smith", he/she is not able to login anymore: he/she cannot login using the default authentication since it is disabled, and cannot login using Windows domain authentication since his/her Windows domain username is not equal to TeamCity username. The solution nevertheless is quite simple: the administrator can login using the super user account and change his/her TeamCity username or specify his/her Windows domain username on his/her own profile page.
Special User Accounts
By default, TeamCity has a Super User account with maximum permissions and a Guest User with minimal permissions. These accounts have no personal settings such as the Changes page and Profile information as they are not related to any particular person but rather intended for special use cases.
Credentials Authentication Modules
By default, TeamCity uses the built-in authentication, meaning that users and their passwords are maintained by TeamCity.
When logging to TeamCity for the first time, the user will be prompted to create the TeamCity username and password which will be stored in TeamCity and used for authentication. If you installed TeamCity and logged into it, it means that built-in authentication is enabled and all user data is stored in TeamCity.
In the beginning the user database is empty and new users are either added by the TeamCity administrator or users are self-registered: the default settings allow the users to register from the login page. All newly created users belong to the All Users group and have all roles assigned to this group. If some specific roles are needed for the newly registered users, these roles should be granted via the All Users group.
By default, the users are allowed to change their password on their profile page.
Allows users to authenticate via access tokens that they can create and invalidate themselves.
This authentication module is enabled by default.
Windows Domain Authentication
Allows user login using Windows domain name and password.The credential check is performed on the TeamCity server side, so the server should be aware of the domain(s) users use to log in.The supported syntax for the username is
DOMAIN\user.name as well as
In addition to logging in using the login form, you can enable NTLM HTTP Authentication single sign-on.
If you select the "Microsoft Windows Domain" preset, in addition to the login via a Windows domain, the Basic HTTP and NTLM authentication modules are enabled by default.
Specifying Default Domain
To enable users to enter the system using the login form without specifying the domain as a part of the user name, do the following:
Go to the Administration | Authentication page.
Click the edit link in the table next to the Microsoft Windows domain authentication description.
Set the name in the Default domain: field.
Click Done and Save your changes.
Registering New Users on Login
The default settings allow users to register from the login page and TeamCity user names for the new users will be the same as their Windows domain account.
All newly created users belong to the All Users group and have all roles assigned to this group. If some specific roles are needed for the newly registered users, these roles should be granted via the All Users group.
To disable new user registration on login:
Go to the Administration | Authentication page.
Click the edit link in the table next to the Microsoft Windows domain authentication description. Uncheck the Allow user registration from the login page box.
Click the edit link in the table next to the NTLM HTTP authentication description. Uncheck the Allow user registration from the login page box.
If your TeamCity server runs under Linux, JCIFS library is used for the Windows domain login. This only supports Windows domain servers with SMB (SMBv1) enabled. SMB2 is not supported.The library is configured using the properties specified in the
< TeamCity Data Directory >/config/ntlm-config.properties file. Changes to the file take effect immediately without the server restart.
JCIFS library settings which cannot be changed in run-time or settings to affect HTTP NTLM settings can only be set via a properties file passed via
-Djcifs.properties JVM option.
If the default settings do not work for your environment, refer to http://jcifs.samba.org/src/docs/api/ for all available configuration properties.
If the library does not find the domain controller to authenticate against, consider adding the
jcifs.netbios.wins property to the
ntlm-config.properties file with the address of your WINS server. For other domain services locating properties, see http://jcifs.samba.org/src/docs/resolver.html.
Please refer to the dedicated page.
HTTP Authentication Modules
Basic HTTP Authentication
Please refer to Accessing Server by HTTP for details about basic HTTP authentication.
NTLM HTTP Authentication
Please refer to the dedicated page.