fingerprint
OIDC Authentication
Integrate with OpenID Connect providers for single sign-on.
Basic Setup
auth:
methods:
oidc:
enabled: true
clientId: "filebrowser-client"
clientSecret: "xxx" # Use environment variable
issuerUrl: "https://sso.example.com/application/o/filebrowser/"
scopes: "email openid profile groups"
userIdentifier: "preferred_username"
createUser: true
Configuration Options
Option | Description |
---|---|
enabled | Enable OIDC authentication |
clientId | OIDC client ID |
clientSecret | OIDC client secret (use env var) |
issuerUrl | OIDC provider URL |
scopes | Requested scopes |
userIdentifier | User field (preferred_username , email , username , phone ) |
createUser | Auto-create users on first login |
adminGroup | OIDC group name for admin rights |
groupsClaim | JSON field for groups (default: groups ) |
disableVerifyTLS | Disable TLS verification (testing only!) |
logoutRedirectUrl | Provider logout URL |
Issuer URL Examples
Authentik/Authelia:
https://domain.com/application/o/filebrowser/
Pocket ID:
https://domain.com/
Callback URL
Configure in your OIDC provider:
https://your-domain.com/api/auth/oidc/callback
With custom baseURL:
https://your-domain.com/custom-base/api/auth/oidc/callback
Auto-Redirect
When OIDC is the only auth method, users are automatically redirected:
auth:
methods:
password:
enabled: false
oidc:
enabled: true
Provider Examples
Authentik
auth:
methods:
oidc:
enabled: true
clientId: "xxx"
clientSecret: "xxx"
issuerUrl: "https://auth.example.com/application/o/filebrowser/"
adminGroup: "authentik Admins"
Authelia
auth:
methods:
oidc:
enabled: true
clientId: "xxx"
clientSecret: "xxx"
issuerUrl: "https://auth.example.com"