-
-
Notifications
You must be signed in to change notification settings - Fork 256
OpenID Connect login (SSO)
After #33 is done, Wakapi supports external authentication providers via OpenID Connect (OIDC). This way, users can benefit from single sign-on (SSO) and won't have to create a local account using e-mail address and password. Authentication is entirely delegated to the upstream provider. OIDC can be used for login and signup, that is, for new users, a new Wakapi account will be created upon first login.
You can configure one or more via the YAML configuration file or using environment variables. Follow the respective provider's instructions to get client ID and -secret. When you register your Wakapi instance as a new application with the provider, make sure to apply these settings:
-
Scopes:
openid,profile,email -
Redirect URL:
https://<your-wakapi-instance>/oidc/<provider>/callback- Note: The
<provider>is the name of the provider in your config, e.g.gitlab,google, ...
- Note: The
# ...
security:
# ...
oidc:
- name: codeberg
display_name: Codeberg
client_id: <your oauth2 client id>
client_secret: <your oauth2 client secret>
endpoint: https://codeberg.org
# ...Here's a list of common providers including links to their documentation and OIDC base endpoints.
Note: While GitHub supports OAuth 2.0 in general, it unfortunately does not support acting as an OpenID Connect provider.
- https://forgejo.org/docs/v8.0/user/oauth2-provider/#using-codeberg-as-an-authentication-source
- https://codeberg.org/.well-known/openid-configuration
- https://docs.gitlab.com/integration/oauth_provider/
- https://gitlab.com/.well-known/openid-configuration
- https://developers.google.com/identity/sign-in/web/sign-in
- https://accounts.google.com/.well-known/openid-configuration
- https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc
- https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration
- https://developer.okta.com/docs/guides/sign-in-overview/main/
- https://your-okta-domain/.well-known/openid-configuration
- https://docs.goauthentik.io/add-secure-apps/providers/oauth2/
- Also see #857 for details