We use cookies to make your experience better.
Learn how to manage Coder authentication.
By default, Coder enables built-in authentication, though you can change this if desired.
To do so, go to Manage > Users. Find the user whose authentication type you want to change, and use the Auth Type to toggle between Built-In and OpenID Connect.
If you opt for OpenID Connect, you'll need to provide additional configuration steps, which are detailed in the subsequent sections of this article.
To set up OIDC authentication, you'll first need to register a Coder application
with your OIDC provider. During this process, you'll be asked to provide a
domain name for the OIDC token callback; use
https://coder.my-company.com/oidc/callback
.
Once you've registered a Coder application with your OIDC provider, you'll need to return to Coder and complete the setup process. Under Admin > Manage > Authentication, ensure that you've selected OpenID Connect as the authentication type. Then, provide the following parameters:
https://my-idp.com/realm/my-org
): The URL where Coder can
find your OIDC provider's configuration documentIf you do not have values for any of these parameters, you can obtain them from your OIDC provider.
There are several additional configuration parameters that may be of interest to you:
https://<yourDomain>/api/v0/users/me/oidc-access-token
requests the scopes openid
, email
, and profile
. Consult your
authentication provider's documentation for information on which scopes they
support.
You can disable built-in authentication as an option for accessing Coder if you have OIDC configured.
To do so, navigate to Manage > Admin > Authentication. Then, toggle Disable built-in authentication to On and click Save preferences.
Site managers can still use built-in authentication. To view this option on the login page, add the following query parameter to the URL you use to access your Coder deployment:
/login?showAllAuthenticationTypes=1
See an opportunity to improve our docs? Make an edit.