Skip to main content
This feature is available in Odigos v1.0.201 and later.

Getting Started

To get started with OIDC, you need to configure the Odigos UI to use an external identity provider.
1

Create a new OIDC application in your identity provider

You can use the Okta or Auth0 guides to create a new OIDC application.
Please note that the OIDC application should be configured to allow the Odigos UI to access the Login redirect URLs.
  • If you are using the default Odigos UI, the redirect URL should be http://localhost:3000/auth/oidc-callback.
  • If you are using a custom/remote UI, the redirect URL should be the URL of the Odigos UI, with the path /auth/oidc-callback.
    For example, if you are using a remote UI at https://my-odigos-ui.com, the redirect URL should be https://my-odigos-ui.com/auth/oidc-callback.
2

Set OIDC variables

You should set the OIDC values in the odigos-config ConfigMap. The values can be obtained from the identity provider, after creating the OIDC application.
  • CLI
  • Helm
You can use the odigos config set command.
odigos config set oidc-tenant-url <value>
odigos config set oidc-client-id <value>
odigos config set oidc-client-secret <value>
3

Set UI remote URL (optional)

If you are hosting the Odigos UI on a custom/remote URL (e.g. https://my-odigos-ui.com), you should set the value in the odigos-config ConfigMap.
  • CLI
  • Helm
You can use the odigos config set command.
odigos config set ui-remote-url <value>