Admin: OIDC providers
Configure OpenID Connect sign-in for self-hosted SlugBase: issuer, client credentials, callback URL, and optional custom endpoints.
What this is for
OIDC Providers lets you register one or more OpenID Connect identity providers so users can sign in with accounts from that IdP (for example your company SSO), in addition to—or instead of—local passwords, depending on how you use the product.
Before you start
- You need access to Admin (see Workspace admin overview).
- Have your IdP’s issuer URL and client ID ready; Client secret is required when adding a new provider in the UI.
How to add a provider
Open OIDC Providers
Under Admin, choose OIDC Providers.
Add Provider
Select Add Provider.
Fill the form
Enter Provider Key (your label for this IdP), Issuer URL, Client ID, and Client Secret for a new provider. Default Scopes are suitable for many setups (openid profile email); adjust if your IdP requires different scopes.
Review behavior flags
Auto Create Users controls whether successful IdP sign-in can create a new SlugBase user automatically. Default Role sets the role for auto-created users.
Custom endpoints (optional)
Custom OIDC Endpoints let you override Authorization URL, Token URL, and UserInfo URL when your provider does not follow standard paths from the issuer. Leave them empty to use defaults derived from the issuer URL.
Save and register the callback
After saving, open the provider card and copy Callback URL. Register that exact URL as an allowed redirect URI in your IdP application settings.
After it is configured
- Each provider card shows the issuer, optional endpoint hints, Auto Create / Default Role badges, and the Callback URL in a monospace block for easy copying.
- Use Edit or Delete from the card actions; delete asks for confirmation.
Related
Last updated 3 days ago
Built with Documentation.AI