[GH-ISSUE #210] Feature Request: Add support for OAuth #173

Closed
opened 2026-02-25 21:31:21 +03:00 by kerem · 4 comments
Owner

Originally created by @fullstackpotato on GitHub (Nov 14, 2020).
Original GitHub issue: https://github.com/ciur/papermerge/issues/210

Originally assigned to: @ciur on GitHub.

Very much similar to the reasoning behind #94

As LDAP authentication is getting added, would it be possible to also add in support for OAuth? The reasoning is pretty much identical to the ticket mentioned above, having support for OAuth would allow users to hook up to pre-existing Single Sign On's (e.g. Keycloak).

Originally created by @fullstackpotato on GitHub (Nov 14, 2020). Original GitHub issue: https://github.com/ciur/papermerge/issues/210 Originally assigned to: @ciur on GitHub. Very much similar to the reasoning behind #94 As LDAP authentication is getting added, would it be possible to also add in support for OAuth? The reasoning is pretty much identical to the ticket mentioned above, having support for OAuth would allow users to hook up to pre-existing Single Sign On's (e.g. Keycloak).
kerem 2026-02-25 21:31:21 +03:00
Author
Owner

@ciur commented on GitHub (Nov 15, 2020):

@0x01BM, thank you for opening this feature request. It makes perfect sense. I didn't know about keycloak project - thanks for mentioning it. I will definitely add OAuth integration.

<!-- gh-comment-id:727569395 --> @ciur commented on GitHub (Nov 15, 2020): @0x01BM, thank you for opening this feature request. It makes perfect sense. I didn't know about keycloak project - thanks for mentioning it. I will definitely add OAuth integration.
Author
Owner

@Auridh commented on GitHub (Jan 12, 2024):

@ciur

I saw OAuth2 and OpenID mentioned as a feature for 3.0.
So are you able to hook up pre-existing SSOs like Keycloak or Authentik now?
I tried looking it up in the documentation, but the section for OAuth2 is still empty.

<!-- gh-comment-id:1889515005 --> @Auridh commented on GitHub (Jan 12, 2024): @ciur I saw OAuth2 and OpenID [mentioned](https://github.com/ciur/papermerge/issues/548) as a feature for 3.0. So are you able to hook up pre-existing SSOs like Keycloak or Authentik now? I tried looking it up in the documentation, but the [section for OAuth2](https://docs.papermerge.io/3.0/setup/docker-compose/#oauth-20) is still empty.
Author
Owner

@ciur commented on GitHub (Jan 13, 2024):

OAuth2 support is "almost there". By "almost there" I mean that I added the feature, I tested it once with Github and Google as auth servers, and it worked! However, after that I've never used the feature again and also not yet documented it.

I have not yet tried it with Keycloak/Authentik/Authelia etc either.
The plan is to have support for OAuth2, OpenID, LDAP anyway.

In short: both feature and documentation is coming soon.

<!-- gh-comment-id:1890310026 --> @ciur commented on GitHub (Jan 13, 2024): OAuth2 support is "almost there". By "almost there" I mean that I added the feature, I tested it once with [Github](https://github.com/papermerge/auth-server/blob/main/auth_server/auth.py#L52) and [Google](https://github.com/papermerge/auth-server/blob/main/auth_server/auth.py#L44) as auth servers, and it worked! However, after that I've never used the feature again and also not yet documented it. I have not yet tried it with Keycloak/Authentik/Authelia etc either. The plan is to have support for OAuth2, OpenID, LDAP anyway. In short: both feature and documentation is coming soon.
Author
Owner

@ciur commented on GitHub (May 14, 2024):

Feature landed (OIDC support) in 3.2: https://docs.papermerge.io/3.2/sso/oidc/overview/

<!-- gh-comment-id:2109942817 --> @ciur commented on GitHub (May 14, 2024): Feature landed (OIDC support) in 3.2: https://docs.papermerge.io/3.2/sso/oidc/overview/
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/papermerge#173
No description provided.