fingerprint
OIDC Authentication
Integrate with OpenID Connect providers for single sign-on.
Basic Setup
Note: Its common to configure a source with denyByDefault and use access rules to enable group based access for OIDC users.
Configuration Options
| Option | Description |
|---|---|
enabled | Enable OIDC authentication |
clientId | OIDC client ID |
clientSecret | OIDC client secret (use env var) |
issuerUrl | OIDC provider URL |
scopes | Requested scopes |
userIdentifier | User field (preferred_username, email, username, phone) |
createUser | Auto-create users on first login |
adminGroup | OIDC group name for admin rights |
groupsClaim | JSON field for groups (default: groups) |
disableVerifyTLS | Disable TLS verification (testing only!) |
logoutRedirectUrl | Provider logout URL |
Issuer URL Examples
Authentik/Authelia:
| |
Pocket ID:
| |
Callback URL
Configure in your OIDC provider:
| |
With custom baseURL:
| |
Auto-Redirect
When OIDC is the only auth method, users are automatically redirected to the OIDC provider.