3.7 KiB
title, description, sidebar_position
| title | description | sidebar_position |
|---|---|---|
| OpenID Connect | Configure OpenID Connect settings. | 2.5 |
OpenID Connect
Seerr supports OpenID Connect (OIDC) for authentication and authorization.
:::tip
Development is ongoing for a settings interface to configure OpenID Connect support in Seerr. In the meantime, configuration must be done by manually updating the settings in settings.json.
::: To begin setting up OpenID Connect, make the following updates:
{
...
- "oidcLogin": false,
+ "oidcLogin": true,
...
"oidc": {
- "providers": []
+ "providers": [
+ {
+ "slug": "example",
+ "name": "Example",
+ "issuerUrl": "https://example.com",
+ "clientId": "seerr",
+ "clientSecret": "SUPER_SECRET_STRING",
+ "logo": "https://example.com/logo.png"
+ }
+ ]
}
...
}
Configuration Options
Provider Slug (slug)
Unique identifier for the provider. This should not be changed after initial setup.
Provider Name (name)
Name of the provider which appears on the login screen.
Logo (logo)
The logo to display for the provider. Should be a URL or base64 encoded image.
Issuer URL (issuerUrl)
The base URL of the identity provider's OpenID Connect endpoint
Client ID (clientId)
The Client ID assigned to Seerr
Client Secret (clientSecret)
The Client Secret assigned to Seerr
Scopes (scopes)
Space-separated list of scopes to request from the provider
Required Claims (requiredClaims)
Space-separated list of boolean claims that are required to log in
Allow New Users (newUserLogin)
Create accounts for new users logging in with this provider
Provider Setup
Most OpenID Connect providers follow the same basic setup pattern:
- Create a new client/application in your identity provider using the OAuth 2.0 / OpenID Connect protocol.
- Set the client type to confidential (as opposed to public) so that a client secret is issued.
- Add redirect URIs pointing to your Seerr instance. At minimum, allow:
https://<your-seerr-url>/loginhttps://<your-seerr-url>/profile/settings/linked-accounts
- Copy the Client ID and Client Secret from your provider and enter them in Seerr's provider configuration.
- Set the Issuer URL to the base URL of your provider's OpenID Connect discovery endpoint. Most providers publish a
/.well-known/openid-configurationdocument — the Issuer URL is the part before that path.
The default scopes (openid profile email) are sufficient for most providers. Only adjust scopes or required claims if your provider requires it.
Provider Guides
Keycloak
To set up Keycloak, follow these steps:
-
Set the client ID to
seerr, and set the name to "Seerr" (or whatever you prefer).
-
Next, be sure to enable "Client authentication" in the capabilities section. The remaining defaults should be fine.

-
Finally, set the root url to your Seerr instance's URL, and a wildcard
/*as a valid redirect URL.
-
With all that set up, you should be able to configure Seerr to use Keycloak for authentication. Be sure to copy the client secret from the credentials page, as shown above. The issuer URL can be obtained from the "Realm Settings" page, by copying the link titled "OpenID Endpoint Configuration".

-
Use
https://<keycloak-url>/realms/<realm>/as the Issuer URL, replacing<realm>with your Keycloak realm name.
