Skip to main content

Server - OIDC

Goal: Connect Wirety Server to an OIDC provider for authenticated UI/API access.

Steps

  1. Create OIDC application (Client ID/Secret, redirect URIs) in provider.
  2. Configure environment variables:
AUTH_ENABLED=true
AUTH_ISSUER_URL=https://keycloak.example.com/realms/wirety
AUTH_CLIENT_ID=wirety-client
AUTH_CLIENT_SECRET=your-client-secret
AUTH_JWKS_CACHE_TTL=3600 # Optional: JWKS cache duration in seconds (default: 3600)
  1. Restart server deployment.
  2. Frontend redirects unauthenticated users to provider; token stored in session.

Scopes

Request openid profile email for user identification (email logged when resolving incidents).

Verification

  • Login flow redirects to provider.
  • User email appears in incident resolution audit.

Troubleshooting

SymptomCauseFix
404 on callbackRedirect URI mismatchUpdate provider config
Silent login failureClock skewSync server time
Email missingScope not grantedAdd email scope