fingerprint
OIDC Authentication
Integrate with OpenID Connect providers for single sign-on.
Basic Setup
Note: Its common to configure a source with denyByDefault and use access rules to enable group based access for OIDC users.
Configuration Options
| Option | Description |
|---|---|
enabled | Enable OIDC authentication |
clientId | OIDC client ID |
clientSecret | OIDC client secret (use env var) |
issuerUrl | OIDC provider URL |
scopes | Requested scopes |
userIdentifier | User field (preferred_username, email, username, phone) |
adminGroup | OIDC group name for admin rights |
userGroups | List of allowed groups (empty = allow all) - requires v1.3.x+ |
groupsClaim | JSON field for groups (default: groups) |
disableVerifyTLS | Disable TLS verification (testing only!) |
logoutRedirectUrl | Provider logout URL |
Issuer URL Examples
Authentik:
| |
Pocket ID/Authelia:
| |
Callback URL
Append /api/auth/oidc/callback to the end of your base URL to get FileBrowser’s OIDC callback URL.
Configure in your OIDC provider:
| |
If you a custom baseURL in your config.yaml:
| |
Auto-Redirect
When OIDC is the only auth method, users are automatically redirected to the OIDC provider.
Provider Examples
Authentik
Authelia
Group-Based Access Control
Admin Group
Grant admin privileges to users in a specific OIDC group:
Restrict login to Specific Groups
requires version 1.3.x+
Only allow users in specific OIDC groups to access FileBrowser:
Users not in these groups will be denied access even with valid OIDC authentication.