This feature is available in Odigos v1.0.201 and later.

Getting Started

To get started with OIDC, you need to configure the Odigos UI to use an external identity provider.

1

Create a new OIDC application in your identity provider

You can use the Okta or Auth0 guides to create a new OIDC provider.

Please note that the OIDC application should be configured to allow the Odigos UI to access the Login redirect URLs.

  • If you are using the default Odigos UI, the redirect URL should be http://localhost:3000/auth/callback.
  • If you are using a custom/remote UI, the redirect URL should be the URL of the Odigos UI, with the path /auth/callback.
    For example, if you are using a remote UI at https://my-odigos-ui.com, the redirect URL should be https://my-odigos-ui.com/auth/callback.
2

Set OIDC variables

You should set the OIDC values in the odigos-config ConfigMap. The values can be obtained from the identity provider, after creating the OIDC application.

You can use the odigos config set command.

odigos config set oidc-tenant-url <value>
odigos config set oidc-client-id <value>
odigos config set oidc-client-secret <value>
3

Set UI remote URL (optional)

If you are hosting the Odigos UI on a custom/remote URL (e.g. https://my-odigos-ui.com), you should set the value in the odigos-config ConfigMap.

You can use the odigos config set command.

odigos config set ui-remote-url <value>