Files
seerr/docs/using-seerr/settings/users/oidc.md
2026-04-15 13:17:31 -04:00

3.7 KiB

title, description, sidebar_position
title description sidebar_position
OpenID Connect Configure OpenID Connect settings. 2.5

OpenID Connect

Seerr supports OpenID Connect (OIDC) for authentication and authorization.

:::tip

Development is ongoing for a settings interface to configure OpenID Connect support in Seerr. In the meantime, configuration must be done by manually updating the settings in settings.json.

::: To begin setting up OpenID Connect, make the following updates:

 {
   ...
-  "oidcLogin": false,
+  "oidcLogin": true,
   ...
   "oidc": {
-    "providers": []
+    "providers": [
+      {
+        "slug": "example",
+        "name": "Example",
+        "issuerUrl": "https://example.com",
+        "clientId": "seerr",
+        "clientSecret": "SUPER_SECRET_STRING",
+        "logo": "https://example.com/logo.png"
+      }
+    ]
   }
   ...
 }

Configuration Options

Provider Slug (slug)

Unique identifier for the provider. This should not be changed after initial setup.

Provider Name (name)

Name of the provider which appears on the login screen.

The logo to display for the provider. Should be a URL or base64 encoded image.

Issuer URL (issuerUrl)

The base URL of the identity provider's OpenID Connect endpoint

Client ID (clientId)

The Client ID assigned to Seerr

Client Secret (clientSecret)

The Client Secret assigned to Seerr

Scopes (scopes)

Space-separated list of scopes to request from the provider

Required Claims (requiredClaims)

Space-separated list of boolean claims that are required to log in

Allow New Users (newUserLogin)

Create accounts for new users logging in with this provider

Provider Setup

Most OpenID Connect providers follow the same basic setup pattern:

  1. Create a new client/application in your identity provider using the OAuth 2.0 / OpenID Connect protocol.
  2. Set the client type to confidential (as opposed to public) so that a client secret is issued.
  3. Add redirect URIs pointing to your Seerr instance. At minimum, allow:
    • https://<your-seerr-url>/login
    • https://<your-seerr-url>/profile/settings/linked-accounts
  4. Copy the Client ID and Client Secret from your provider and enter them in Seerr's provider configuration.
  5. Set the Issuer URL to the base URL of your provider's OpenID Connect discovery endpoint. Most providers publish a /.well-known/openid-configuration document — the Issuer URL is the part before that path.

The default scopes (openid profile email) are sufficient for most providers. Only adjust scopes or required claims if your provider requires it.

Provider Guides

Keycloak

To set up Keycloak, follow these steps:

  1. First, create a new client in Keycloak. Keycloak Step 1

  2. Set the client ID to seerr, and set the name to "Seerr" (or whatever you prefer). Keycloak Step 2

  3. Next, be sure to enable "Client authentication" in the capabilities section. The remaining defaults should be fine. Keycloak Step 3

  4. Finally, set the root url to your Seerr instance's URL, and a wildcard /* as a valid redirect URL. Keycloak Step 4

  5. With all that set up, you should be able to configure Seerr to use Keycloak for authentication. Be sure to copy the client secret from the credentials page, as shown above. The issuer URL can be obtained from the "Realm Settings" page, by copying the link titled "OpenID Endpoint Configuration". Keycloak Step 5

  6. Use https://<keycloak-url>/realms/<realm>/ as the Issuer URL, replacing <realm> with your Keycloak realm name.