* feat: add support for displaying and managing legacy SSO providers - Introduced UI section for environment/YAML-configured SSO providers. - Added warnings and guidance on migrating legacy providers to database-backed configuration. - Enhanced localization with new keys for legacy provider management. - Updated form and toggle components for improved usability. * Expand SSO documentation: add SAML 2.0 support, JIT provisioning settings, super-admin setup steps, audit logging, and user administration details. * Update JIT provisioning docs: clarify role mapping behavior and add examples; note new `logout_idp` audit log event. --------- Co-authored-by: Josh Waldrep <joshua.waldrep5+github@gmail.com>
18 KiB
Configuring OpenID Connect, SAML, and SSO Providers
This guide shows how to enable OpenID Connect (OIDC), SAML 2.0, and other single sign-on (SSO) providers for Sure using Google, GitHub, or another identity provider (e.g. Keycloak, Authentik, Okta, Azure AD).
It also documents the new config/auth.yml and environment variables that control:
- Whether local email/password login is enabled
- Whether an emergency super‑admin override is allowed
- How JIT SSO account creation behaves (create vs link‑only, allowed domains)
- Which SSO providers appear as buttons on the login page
1. Create an OIDC / OAuth client in your IdP
For Google, follow the standard OAuth2 client setup:
-
Visit https://console.cloud.google.com and sign in.
-
Create a new project or select an existing one.
-
Configure the OAuth consent screen under APIs & Services > OAuth consent screen.
-
Go to APIs & Services > Credentials and click Create Credentials > OAuth client ID.
-
Select Web application as the application type.
-
Add an authorized redirect URI. For local development:
http://localhost:3000/auth/openid_connect/callbackFor production, use your domain:
https://yourdomain.com/auth/openid_connect/callback -
After creating the credentials, copy the Client ID and Client Secret.
For other OIDC providers (e.g. Keycloak), create a client with a redirect URI of:
https://yourdomain.com/auth/openid_connect/callback
and ensure that the openid, email, and profile scopes are available.
2. Configure Sure: OIDC core settings
Set the following environment variables in your deployment (e.g. .env, docker-compose, or hosting platform):
OIDC_ISSUER="https://accounts.google.com" # or your Keycloak/AuthentiK issuer URL
OIDC_CLIENT_ID="your-oidc-client-id"
OIDC_CLIENT_SECRET="your-oidc-client-secret"
OIDC_REDIRECT_URI="https://yourdomain.com/auth/openid_connect/callback"
Restart the application after saving the variables.
When OIDC is correctly configured, users can sign in from the login page using the Sign in with OpenID Connect button (label can be customized, see below). The IdP must report the user's email as verified, and it must match an existing user or be allowed for JIT creation.
3. Auth configuration (config/auth.yml)
Authentication behavior is driven by config/auth.yml, which can be overridden via environment variables.
3.1 Structure
default: &default
local_login:
enabled: <%= ENV.fetch("AUTH_LOCAL_LOGIN_ENABLED", "true") == "true" %>
admin_override_enabled: <%= ENV.fetch("AUTH_LOCAL_ADMIN_OVERRIDE_ENABLED", "false") == "true" %>
jit:
mode: <%= ENV.fetch("AUTH_JIT_MODE", "create_and_link") %>
allowed_oidc_domains: <%= ENV.fetch("ALLOWED_OIDC_DOMAINS", "") %>
providers:
- id: "oidc"
strategy: "openid_connect"
name: "openid_connect"
label: <%= ENV.fetch("OIDC_BUTTON_LABEL", "Sign in with OpenID Connect") %>
icon: <%= ENV.fetch("OIDC_BUTTON_ICON", "key") %>
- id: "google"
strategy: "google_oauth2"
name: "google_oauth2"
label: <%= ENV.fetch("GOOGLE_BUTTON_LABEL", "Sign in with Google") %>
icon: <%= ENV.fetch("GOOGLE_BUTTON_ICON", "google") %>
- id: "github"
strategy: "github"
name: "github"
label: <%= ENV.fetch("GITHUB_BUTTON_LABEL", "Sign in with GitHub") %>
icon: <%= ENV.fetch("GITHUB_BUTTON_ICON", "github") %>
development:
<<: *default
test:
<<: *default
production:
<<: *default
3.2 Local login flags
-
AUTH_LOCAL_LOGIN_ENABLED(default:true)- When
true, the login page shows the email/password form and "Forgot password" link. - When
false, local login is disabled for all users unless the admin override flag is enabled. - When
false, password reset via Sure is also disabled (users must reset via the IdP).
- When
-
AUTH_LOCAL_ADMIN_OVERRIDE_ENABLED(default:false)- When
trueandAUTH_LOCAL_LOGIN_ENABLED=false, super‑admin users can still log in with local passwords. - Regular users remain SSO‑only.
- The login form is visible with a note: "Local login is restricted to administrators."
- Successful override logins are logged in the Rails logs.
- When
3.3 JIT user creation
-
AUTH_JIT_MODE(default:create_and_link)create_and_link: the current behavior.- If the SSO identity is new and the email does not match an existing user, Sure will offer to create a new account (subject to domain checks below).
link_only: stricter behavior.- New SSO identities can only be linked to existing users; JIT account creation is disabled.
- Users without an existing account are sent back to the login page with an explanatory message.
-
ALLOWED_OIDC_DOMAINS- Optional comma‑separated list of domains (e.g.
example.com,corp.com). - When empty, JIT SSO account creation is allowed for any verified email.
- When set, JIT SSO account creation is only allowed if the email domain is in this list.
- Applies uniformly to all SSO providers (OIDC, Google, GitHub, etc.) that supply an email.
- Optional comma‑separated list of domains (e.g.
3.4 Providers and buttons
Each provider entry in providers configures an SSO button on the login page:
id: a short identifier used in docs and conditionals.strategy: the OmniAuth strategy (openid_connect,google_oauth2,github, ...).name: the OmniAuth provider name, which determines the/auth/:providerpath.label: button text shown to users.icon: optional icon name passed to the Sureiconhelper (e.g.key,google,github).
Special behavior:
- Providers with
id: "google"orstrategy: "google_oauth2"render a Google‑branded sign‑in button. - Other providers (e.g. OIDC/Keycloak, GitHub) render a generic styled button with the configured label and icon.
Enabling Google sign‑in (local dev / self‑hosted)
The Google button is only shown when the Google provider is actually registered by OmniAuth at boot.
To enable Google:
-
Ensure the Google provider exists in
config/auth.ymlunderproviders:withstrategy: "google_oauth2". -
Set these environment variables (for example in
.env.local, Docker Compose, or your process manager):GOOGLE_OAUTH_CLIENT_IDGOOGLE_OAUTH_CLIENT_SECRET
If either is missing, Sure will skip registering the Google provider and the Google button will not appear on the login page.
-
In your Google Cloud OAuth client configuration, add an authorized redirect URI that matches the host you use in dev.
Common local values:
http://localhost:3000/auth/google_oauth2/callbackhttp://127.0.0.1:3000/auth/google_oauth2/callback
If you customize the provider
nameinconfig/auth.yml, the callback path changes accordingly:http://localhost:3000/auth/<provider_name>/callback
3.5 Bootstrapping the first super‑admin
The first super_admin must be set via Rails console. Access the console in your container/pod or directly on the server:
bin/rails console
Then promote a user:
# Set super_admin role
User.find_by(email: "admin@example.com").update!(role: :super_admin)
# Verify
User.find_by(email: "admin@example.com").role # => "super_admin"
Once set, super‑admins can promote other users via the web UI at /admin/users.
4. Example configurations
4.1 Default hybrid (local + SSO)
This is effectively the default configuration:
AUTH_LOCAL_LOGIN_ENABLED=true
AUTH_LOCAL_ADMIN_OVERRIDE_ENABLED=false
AUTH_JIT_MODE=create_and_link
ALLOWED_OIDC_DOMAINS="" # or unset
Behavior:
- Users can sign in with email/password or via any configured SSO providers.
- JIT SSO account creation is allowed for all verified email domains.
4.2 Pure SSO‑only
Disable local login entirely:
AUTH_LOCAL_LOGIN_ENABLED=false
AUTH_LOCAL_ADMIN_OVERRIDE_ENABLED=false
Behavior:
- Email/password form and "Forgot password" link are hidden.
POST /sessionswith local credentials is blocked and redirected with a message.- Password reset routes are disabled (redirect to the login page with an IdP message).
4.3 SSO‑only with emergency admin override
Allow only super‑admin users to log in locally during IdP outages:
AUTH_LOCAL_LOGIN_ENABLED=false
AUTH_LOCAL_ADMIN_OVERRIDE_ENABLED=true
Behavior:
- Login page shows the email/password form with a note that local login is restricted to administrators.
- Super‑admins can log in with their local password; non‑super‑admins are blocked.
- Password reset remains disabled for everyone.
- Successful override logins are logged.
4.4 Link‑only JIT + restricted domains
Lock down JIT creation to specific domains and require existing users otherwise:
AUTH_JIT_MODE=link_only
ALLOWED_OIDC_DOMAINS="example.com,yourcorp.com"
Behavior:
- SSO sign‑ins with emails under
example.comoryourcorp.comcan be linked to existing Sure users. - New account creation via SSO is disabled; users without accounts see appropriate messaging and must contact an admin.
- SSO sign‑ins from any other domain cannot JIT‑create accounts.
With these settings, you can run Sure in:
- Traditional local login mode
- Hybrid local + SSO mode
- Strict SSO‑only mode with optional super‑admin escape hatch
- Domain‑restricted and link‑only enterprise SSO modes
Use the combination that best fits your self‑hosted environment and security posture.
5. Multiple OIDC Providers
Sure supports configuring multiple OIDC providers simultaneously, allowing users to choose between different identity providers (e.g., Keycloak, Authentik, Okta) on the login page.
5.1 YAML-based multi-provider configuration
To add multiple OIDC providers in config/auth.yml, add additional provider entries with unique names:
providers:
# First OIDC provider (e.g., Keycloak)
- id: "keycloak"
strategy: "openid_connect"
name: "keycloak"
label: "Sign in with Keycloak"
icon: "key"
issuer: <%= ENV["OIDC_KEYCLOAK_ISSUER"] %>
client_id: <%= ENV["OIDC_KEYCLOAK_CLIENT_ID"] %>
client_secret: <%= ENV["OIDC_KEYCLOAK_CLIENT_SECRET"] %>
redirect_uri: <%= ENV["OIDC_KEYCLOAK_REDIRECT_URI"] %>
# Second OIDC provider (e.g., Authentik)
- id: "authentik"
strategy: "openid_connect"
name: "authentik"
label: "Sign in with Authentik"
icon: "shield"
issuer: <%= ENV["OIDC_AUTHENTIK_ISSUER"] %>
client_id: <%= ENV["OIDC_AUTHENTIK_CLIENT_ID"] %>
client_secret: <%= ENV["OIDC_AUTHENTIK_CLIENT_SECRET"] %>
redirect_uri: <%= ENV["OIDC_AUTHENTIK_REDIRECT_URI"] %>
Set the corresponding environment variables:
# Keycloak provider
OIDC_KEYCLOAK_ISSUER="https://keycloak.example.com/realms/myrealm"
OIDC_KEYCLOAK_CLIENT_ID="sure-client"
OIDC_KEYCLOAK_CLIENT_SECRET="your-keycloak-secret"
OIDC_KEYCLOAK_REDIRECT_URI="https://yourdomain.com/auth/keycloak/callback"
# Authentik provider
OIDC_AUTHENTIK_ISSUER="https://authentik.example.com/application/o/sure/"
OIDC_AUTHENTIK_CLIENT_ID="sure-authentik-client"
OIDC_AUTHENTIK_CLIENT_SECRET="your-authentik-secret"
OIDC_AUTHENTIK_REDIRECT_URI="https://yourdomain.com/auth/authentik/callback"
Important: Each provider must have a unique name field, which determines the callback URL path (/auth/<name>/callback).
6. Database-Backed Provider Management
For more dynamic provider management, Sure supports storing SSO provider configurations in the database with a web-based admin interface.
6.1 Enabling database providers
Set the feature flag to load providers from the database instead of YAML:
AUTH_PROVIDERS_SOURCE=db
When enabled:
- Providers are loaded from the
sso_providersdatabase table - Changes take effect immediately (no server restart required)
- Providers can be managed through the admin UI at
/admin/sso_providers
When disabled (default):
- Providers are loaded from
config/auth.yml - Changes require a server restart
6.2 Admin UI for SSO providers
Super-admin users can manage SSO providers through the web interface:
- Navigate to
/admin/sso_providers - View all configured providers (enabled/disabled status)
- Add new providers with the "Add Provider" button
- Edit existing providers (credentials, labels, icons)
- Enable/disable providers with the toggle button
- Delete providers (with confirmation)
Security notes:
- Only users with
super_adminrole can access the admin interface - All provider changes are logged with user ID and timestamp
- Client secrets are encrypted in the database using Rails 7.2 encryption
- Admin endpoints are rate-limited (10 requests/minute per IP)
6.3 Seeding providers from YAML to database
To migrate your existing YAML configuration to the database:
# Dry run (preview changes without saving)
DRY_RUN=true rails sso_providers:seed
# Apply changes
rails sso_providers:seed
The seeding task:
- Reads providers from
config/auth.yml - Creates or updates database records (idempotent)
- Preserves existing client secrets if not provided in YAML
- Provides detailed output (created/updated/skipped/errors)
To list all providers in the database:
rails sso_providers:list
6.4 Migration workflow
Recommended steps to migrate from YAML to database-backed providers:
-
Backup your configuration:
cp config/auth.yml config/auth.yml.backup -
Run migrations:
rails db:migrate -
Seed providers from YAML (dry run first):
DRY_RUN=true rails sso_providers:seed -
Review the output, then apply:
rails sso_providers:seed -
Enable database provider source:
# Add to .env or environment AUTH_PROVIDERS_SOURCE=db -
Restart the application:
# Docker Compose docker-compose restart app # Or your process manager systemctl restart sure -
Verify providers are loaded:
- Check logs for
[ProviderLoader] Loaded N provider(s) from database - Visit
/admin/sso_providersto manage providers
- Check logs for
6.5 Rollback to YAML
To switch back to YAML-based configuration:
- Remove or set
AUTH_PROVIDERS_SOURCE=yaml - Restart the application
- Providers will be loaded from
config/auth.yml
6.6 JIT provisioning settings
Each provider has a Default Role field (defaults to member) that sets the role for JIT-created users.
Role mapping from IdP groups:
Expand "Role Mapping" in the admin UI to map IdP group names to Sure roles. Enter comma-separated group names for each role:
- Super Admin Groups:
Platform-Admins, IdP-Superusers - Admin Groups:
Team-Leads, Managers - Member Groups:
Everyoneor leave blank
Mapping is case-sensitive and matches exact group claim values from the IdP. When a user belongs to multiple mapped groups, the highest role wins (super_admin > admin > member). If no groups match, the Default Role is used.
7. Troubleshooting
Provider not appearing on login page
- YAML mode: Check that required environment variables are set (e.g.,
OIDC_ISSUER,OIDC_CLIENT_ID,OIDC_CLIENT_SECRET) - DB mode: Verify provider is enabled in
/admin/sso_providers - Check application logs for provider loading messages
- Verify
AUTH_PROVIDERS_SOURCEis set correctly
Discovery endpoint validation fails
When adding an OIDC provider, Sure validates the .well-known/openid-configuration endpoint:
- Ensure the issuer URL is correct and accessible
- Check firewall rules allow outbound HTTPS to the issuer
- Verify the issuer returns valid JSON with an
issuerfield - For self-signed certificates, you may need to configure SSL verification
Rate limiting errors (429)
Admin endpoints are rate-limited to 10 requests per minute per IP:
- Wait 60 seconds before retrying
- If legitimate traffic is being blocked, adjust limits in
config/initializers/rack_attack.rb
Callback URL mismatch
Each provider requires a callback URL configured in your identity provider:
- Format:
https://yourdomain.com/auth/<provider_name>/callback - Example: For a provider with
name: "keycloak", usehttps://yourdomain.com/auth/keycloak/callback - The callback URL is shown in the admin UI when editing a provider (with copy button)
8. Security Considerations
Encryption
- Client secrets are encrypted at rest using Rails 7.2 ActiveRecord Encryption
- Encryption keys are derived from
SECRET_KEY_BASEby default - For additional security, set custom encryption keys (see
.envforACTIVE_RECORD_ENCRYPTION_*variables)
Issuer validation
- OIDC identities store the issuer claim from the ID token
- On subsequent logins, Sure verifies the issuer matches the configured provider
- This prevents issuer impersonation attacks
Admin access
- SSO provider management requires
super_adminrole - Regular
adminusers (family admins) cannot access/admin/sso_providers - All provider changes are logged with user ID
Rate limiting
- Admin endpoints: 10 requests/minute per IP
- OAuth token endpoint: 10 requests/minute per IP
- Failed login attempts should be monitored separately
9. SAML 2.0 Support
Sure supports SAML 2.0 via database-backed providers. Select "SAML 2.0" as the strategy when adding a provider at /admin/sso_providers.
Configure with either:
- IdP Metadata URL (recommended) - auto-fetches configuration
- Manual config - IdP SSO URL + certificate
In your IdP, set:
- ACS URL:
https://yourdomain.com/auth/<provider_name>/callback - Entity ID:
https://yourdomain.com(yourAPP_URL) - Name ID: Email Address
10. User Administration
Super‑admins can manage user roles at /admin/users.
Roles: member (standard), admin (family admin), super_admin (platform admin).
Note: Super‑admins cannot change their own role.
11. Audit Logging
SSO events are logged to sso_audit_logs: login, login_failed, logout, logout_idp (federated logout), link, unlink, jit_account_created.
Query via console:
SsoAuditLog.by_event("login").recent.limit(50)
SsoAuditLog.by_event("login_failed").where("created_at > ?", 24.hours.ago)
12. User SSO Identity Management
Users manage linked SSO identities at Settings > Security.
SSO-only users (no password) cannot unlink their last identity.
For additional help, see the main hosting documentation or open an issue on GitHub.