14 KiB
Authentication
By default, Coder is accessible via password authentication. Coder does not recommend using password authentication in production, and recommends using an authentication provider with properly configured multi-factor authentication (MFA). It is your responsibility to ensure the auth provider enforces MFA correctly.
The following steps explain how to set up GitHub OAuth or OpenID Connect.
GitHub
Step 1: Configure the OAuth application in GitHub
First, register a GitHub OAuth app. GitHub will ask you for the following Coder parameters:
- Homepage URL: Set to your Coder domain (e.g.
https://coder.domain.com
) - User Authorization Callback URL: Set to
https://coder.domain.com/api/v2/users/oauth2/github/callback
Note the Client ID and Client Secret generated by GitHub. You will use these values in the next step.
Step 2: Configure Coder with the OAuth credentials
Navigate to your Coder host and run the following command to start up the Coder server:
coder server --oauth2-github-allow-signups=true --oauth2-github-allowed-orgs="your-org" --oauth2-github-client-id="8d1...e05" --oauth2-github-client-secret="57ebc9...02c24c"
For GitHub Enterprise support, specify the
--oauth2-github-enterprise-base-url
flag.
Alternatively, if you are running Coder as a system service, you can achieve the
same result as the command above by adding the following environment variables
to the /etc/coder.d/coder.env
file:
CODER_OAUTH2_GITHUB_ALLOW_SIGNUPS=true
CODER_OAUTH2_GITHUB_ALLOWED_ORGS="your-org"
CODER_OAUTH2_GITHUB_CLIENT_ID="8d1...e05"
CODER_OAUTH2_GITHUB_CLIENT_SECRET="57ebc9...02c24c"
Note: To allow everyone to signup using GitHub, set:
CODER_OAUTH2_GITHUB_ALLOW_EVERYONE=true
Once complete, run sudo service coder restart
to reboot Coder.
If deploying Coder via Helm, you can set the above environment variables in the
values.yaml
file as such:
coder:
env:
- name: CODER_OAUTH2_GITHUB_ALLOW_SIGNUPS
value: true
- name: CODER_OAUTH2_GITHUB_ALLOWED_ORGS
value: "your-org"
- name: CODER_OAUTH2_GITHUB_CLIENT_ID
value: "533...des"
- name: CODER_OAUTH2_GITHUB_CLIENT_SECRET
value: "G0CSP...7qSM"
- name: CODER_OAUTH2_GITHUB_ALLOW_EVERYONE
value: true
To upgrade Coder, run:
helm upgrade <release-name> coder-v2/coder -n <namespace> -f values.yaml
We recommend requiring and auditing MFA usage for all users in your GitHub organizations. This can be enforced from the organization settings page in the "Authentication security" sidebar tab.
OpenID Connect
The following steps through how to integrate any OpenID Connect provider (Okta, Active Directory, etc.) to Coder.
Step 1: Set Redirect URI with your OIDC provider
Your OIDC provider will ask you for the following parameter:
- Redirect URI: Set to
https://coder.domain.com/api/v2/users/oidc/callback
Step 2: Configure Coder with the OpenID Connect credentials
Navigate to your Coder host and run the following command to start up the Coder server:
coder server --oidc-issuer-url="https://issuer.corp.com" --oidc-email-domain="your-domain-1,your-domain-2" --oidc-client-id="533...des" --oidc-client-secret="G0CSP...7qSM"
If you are running Coder as a system service, you can achieve the
same result as the command above by adding the following environment variables
to the /etc/coder.d/coder.env
file:
CODER_OIDC_ISSUER_URL="https://issuer.corp.com"
CODER_OIDC_EMAIL_DOMAIN="your-domain-1,your-domain-2"
CODER_OIDC_CLIENT_ID="533...des"
CODER_OIDC_CLIENT_SECRET="G0CSP...7qSM"
Once complete, run sudo service coder restart
to reboot Coder.
If deploying Coder via Helm, you can set the above environment variables in the
values.yaml
file as such:
coder:
env:
- name: CODER_OIDC_ISSUER_URL
value: "https://issuer.corp.com"
- name: CODER_OIDC_EMAIL_DOMAIN
value: "your-domain-1,your-domain-2"
- name: CODER_OIDC_CLIENT_ID
value: "533...des"
- name: CODER_OIDC_CLIENT_SECRET
value: "G0CSP...7qSM"
To upgrade Coder, run:
helm upgrade <release-name> coder-v2/coder -n <namespace> -f values.yaml
OIDC Claims
When a user logs in for the first time via OIDC, Coder will merge both
the claims from the ID token and the claims obtained from hitting the
upstream provider's userinfo
endpoint, and use the resulting data
as a basis for creating a new user or looking up an existing user.
To troubleshoot claims, set CODER_VERBOSE=true
and follow the logs
while signing in via OIDC as a new user. Coder will log the claim fields
returned by the upstream identity provider in a message containing the
string got oidc claims
, as well as the user info returned.
Note: If you need to ensure that Coder only uses information from the ID token and does not hit the UserInfo endpoint, you can set the configuration option
CODER_OIDC_IGNORE_USERINFO=true
.
Email Addresses
By default, Coder will look for the OIDC claim named email
and use that
value for the newly created user's email address.
If your upstream identity provider users a different claim, you can set
CODER_OIDC_EMAIL_FIELD
to the desired claim.
Note: If this field is not present, Coder will attempt to use the claim field configured for
username
as an email address. If this field is not a valid email address, OIDC logins will fail.
Email Address Verification
Coder requires all OIDC email addresses to be verified by default. If
the email_verified
claim is present in the token response from the identity
provider, Coder will validate that its value is true
. If needed, you can
disable this behavior with the following setting:
CODER_OIDC_IGNORE_EMAIL_VERIFIED=true
Note: This will cause Coder to implicitly treat all OIDC emails as "verified", regardless of what the upstream identity provider says.
Usernames
When a new user logs in via OIDC, Coder will by default use the value
of the claim field named preferred_username
as the the username.
If your upstream identity provider uses a different claim, you can
set CODER_OIDC_USERNAME_FIELD
to the desired claim.
Note: If this claim is empty, the email address will be stripped of the domain, and become the username (e.g.
example@coder.com
becomesexample
). To avoid conflicts, Coder may also append a random word to the resulting username.
OIDC Login Customization
If you'd like to change the OpenID Connect button text and/or icon, you can configure them like so:
CODER_OIDC_SIGN_IN_TEXT="Sign in with Gitea"
CODER_OIDC_ICON_URL=https://gitea.io/images/gitea.png
Disable Built-in Authentication
To remove email and password login, set the following environment variable on your Coder deployment:
CODER_DISABLE_PASSWORD_AUTH=true
SCIM (enterprise)
Coder supports user provisioning and deprovisioning via SCIM 2.0 with header authentication. Upon deactivation, users are suspended and are not deleted. Configure your SCIM application with an auth key and supply it the Coder server.
CODER_SCIM_API_KEY="your-api-key"
TLS
If your OpenID Connect provider requires client TLS certificates for authentication, you can configure them like so:
CODER_TLS_CLIENT_CERT_FILE=/path/to/cert.pem
CODER_TLS_CLIENT_KEY_FILE=/path/to/key.pem
Group Sync (enterprise)
If your OpenID Connect provider supports group claims, you can configure Coder to synchronize groups in your auth provider to groups within Coder.
To enable group sync, ensure that the groups
claim is set by adding the correct scope to request. If group sync is
enabled, the user's groups will be controlled by the OIDC provider. This means
manual group additions/removals will be overwritten on the next login.
# as an environment variable
CODER_OIDC_SCOPES=openid,profile,email,groups
# as a flag
--oidc-scopes openid,profile,email,groups
With the groups
scope requested, we also need to map the groups
claim name. Coder recommends using groups
for the claim name. This step is necessary if your scope's name is something other than groups
.
# as an environment variable
CODER_OIDC_GROUP_FIELD=groups
# as a flag
--oidc-group-field groups
On login, users will automatically be assigned to groups that have matching names in Coder and removed from groups that the user no longer belongs to.
For cases when an OIDC provider only returns group IDs (Azure AD) or you want to have different group names in Coder than in your OIDC provider, you can configure mapping between the two.
# as an environment variable
CODER_OIDC_GROUP_MAPPING='{"myOIDCGroupID": "myCoderGroupName"}'
# as a flag
--oidc-group-mapping '{"myOIDCGroupID": "myCoderGroupName"}'
Below is an example mapping in the Coder Helm chart:
coder:
env:
- name: CODER_OIDC_GROUP_MAPPING
value: >
{"myOIDCGroupID": "myCoderGroupName"}
From the example above, users that belong to the myOIDCGroupID
group in your
OIDC provider will be added to the myCoderGroupName
group in Coder.
Note: Groups are only updated on login.
Troubleshooting
Some common issues when enabling group sync.
Invalid Scope
If you see an error like the following, you may have an invalid scope.
The application '<oidc_application>' asked for scope 'groups' that doesn't exist on the resource...
This can happen because the identity provider has a different name for the scope. For example, Azure AD uses GroupMember.Read.All
instead of groups
. You can find the correct scope name in the IDP's documentation. Some IDP's allow configuring the name of this scope.
The solution is to update the value of CODER_OIDC_SCOPES
to the correct value for the identity provider.
No group
claim in the got oidc claims
log
Steps to troubleshoot.
- Ensure the user is a part of a group in the IDP. If the user has 0 groups, no
groups
claim will be sent. - Check if another claim appears to be the correct claim with a different name. A common name is
memberOf
instead ofgroups
. If this is present, updateCODER_OIDC_GROUP_FIELD=memberOf
. - Make sure the number of groups being sent is under the limit of the IDP. Some IDPs will return an error, while others will just omit the
groups
claim. A common solution is to create a filter on the identity provider that returns less than the limit for your IDP.
Provider-Specific Guides
Below are some details specific to individual OIDC providers.
Active Directory Federation Services (ADFS)
Note: Tested on ADFS 4.0, Windows Server 2019
-
In your Federation Server, create a new application group for Coder. Follow the steps as described here.
- Server Application: Note the Client ID.
- Configure Application Credentials: Note the Client Secret.
- Configure Web API: Set the Client ID as the relying party identifier.
- Application Permissions: Allow access to the claims
openid
,email
,profile
, andallatclaims
.
-
Visit your ADFS server's
/.well-known/openid-configuration
URL and note the value forissuer
.Note: This is usually of the form
https://adfs.corp/adfs/.well-known/openid-configuration
-
In Coder's configuration file (or Helm values as appropriate), set the following environment variables or their corresponding CLI arguments:
-
CODER_OIDC_ISSUER_URL
: theissuer
value from the previous step. -
CODER_OIDC_CLIENT_ID
: the Client ID from step 1. -
CODER_OIDC_CLIENT_SECRET
: the Client Secret from step 1. -
CODER_OIDC_AUTH_URL_PARAMS
: set to{"resource":"$CLIENT_ID"}
where
$CLIENT_ID
is the Client ID from step 1 (see here). This is required for the upstream OIDC provider to return the requested claims. -
CODER_OIDC_IGNORE_USERINFO
: Set totrue
.
-
-
Configure Issuance Transform Rules on your federation server to send the following claims:
-
preferred_username
: You can use e.g. "Display Name" as required. -
email
: You can use e.g. the LDAP attribute "E-Mail-Addresses" as required. -
email_verified
: Create a custom claim rule:=> issue(Type = "email_verified", Value = "true")
-
(Optional) If using Group Sync, send the required groups in the configured groups claim field. See here for an example.
-
Keycloak
The access_type parameter has two possible values: "online" and "offline." By default, the value is set to "offline". This means that when a user authenticates using OIDC, the application requests offline access to the user's resources, including the ability to refresh access tokens without requiring the user to reauthenticate.
To enable the offline_access
scope, which allows for the refresh token functionality, you need to add it to the list of requested scopes during the authentication flow. Including the offline_access
scope in the requested scopes ensures that the user is granted the necessary permissions to obtain refresh tokens.
By combining the {"access_type":"offline"}
parameter in the OIDC Auth URL with the offline_access
scope, you can achieve the desired behavior of obtaining refresh tokens for offline access to the user's resources.