Configuring VergeOS as an OIDC Client#
Overview#
Key Points
- Configure VergeOS to use OIDC authentication
- Connect to a VergeOS OIDC identity provider
- Enable automatic user creation and synchronization
- Customize login appearance and behavior
This guide explains how to configure a VergeOS system or tenant to authenticate using another VergeOS system as an OIDC identity provider.
Prerequisites#
- Access to the VergeOS OIDC provider system
- Well Known Configuration URL from the provider
- Client ID and Client Secret from the provider
- Administrative access to the client VergeOS system
- Full URL of the client VergeOS system
Steps#
1. Access Authorization Settings#
- Navigate to the Main Dashboard
- Click System in the left menu
- Select Authorization Sources
- Click New
2. Configure Basic Settings#
- Name: Enter an identifier for this auth source (appears on login button)
- Driver: Select OpenID (Well Known Config)
- Base URL: Enter the Well Known Configuration URL
- Redirect URI: Enter the full URL of this VergeOS system
- Client ID: Paste the client ID from the provider
- Client Secret: Paste the client secret from the provider
3. Configure Authentication Parameters#
Default values typically work best for these settings:
- Token hint parameter: Leave as post_logout_redirect_uri
- Redirect parameter: Leave as post_logout_redirect_uri
- Scope: Leave as openid profile email groups
- Group Scope: Leave as groups
4. Enable Recommended Options#
Check these boxes for optimal functionality: - Decode ID Token - Update Remote User - Update User Email Address - Update User Display Name - Update Group Membership
5. Configure User Creation#
Choose your preferred user creation method:
- Auto-Create Users: Enter .*
to create all users automatically
- Auto-Create Users in Group: Specify groups for restricted auto-creation
6. Customize Login Appearance#
Optionally configure: - Button background color - Button text color - Custom Font Awesome icon - Icon color (using HEX codes)
7. Save Configuration#
- Click Submit to create the authorization source
Best Practices#
- Test authentication with a test user before rolling out widely
- Keep debug mode disabled unless troubleshooting
- Document your configuration choices for future reference
- Regular verify user synchronization is working as expected
Troubleshooting#
Common Issues
-
Authentication Fails
- Verify Client ID and Secret are correct
- Check Well Known Configuration URL
- Ensure Redirect URI matches exactly
-
User Sync Issues
- Verify Group Scope is enabled
- Check group membership settings
- Enable Debug Mode temporarily
-
Login Button Missing
- Verify authorization source is enabled
- Check login styling settings
- Clear browser cache
Additional Resources#
Feedback#
Need Help?
If you encounter any issues while configuring OIDC client settings or have questions about this process, please don't hesitate to contact our support team.
Document Information
- Last Updated: 2024-01-22
- VergeOS Version: 4.12 and later