mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 01:15:51 +03:00
[GH-ISSUE #5241] OIDC-based access lists #3147
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#3147
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Talismanian on GitHub (Jan 28, 2026).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/5241
Problem:
Not all sites have built in authentication, but NPM can help in this regard through access lists.
Currently, proxy hosts filtered by access lists require specific username and passwords to be added in the NPM interface. Authentication is via basic HTTP. This means that any changes for access must be done via NPM as an admin and reinforces the weaknesses of using passwords as an authentication method for hosts that require restricted access.
Solution:
When altering the access list, you are presented with an option to add a standard basic HTTP password or an OIDC connection. The connection receives the client ID and secret provided by the OIDC provider and other relevant details.
When a user visits the relevant site, they are presented with the OIDC login. If the application is configured in the OIDC manager to allow this user, then they are let in.
Alternatives
Ideally, built in authentication is preferable but this could be a solid and robust Plan B, especially for sites with insufficiently strong authentication built in.