Custom OIDC Configuration
- SambaStack on-prem / Airgapped
- SambaStack hosted
To integrate SambaStack with your organization’s identity provider, configure custom OIDC authentication.
These correspond to environment variables: Replace the placeholders with your actual values (all base64 encoded):Step 4: Update
Add the OIDC configuration to your
Step 1: Gather required values
| Source | Values |
|---|---|
| Provided by your OIDC provider | OIDC_CLIENT_ID, OIDC_CLIENT_SECRET, OIDC_ISSUER_URL, OIDC_REDIRECT_URI |
| Random string to be created | JWT_SECRET_KEY |
OIDC_CLIENT_ID, OIDC_CLIENT_SECRET, OIDC_ISSUER_URL, OIDC_REDIRECT_URI, and JWT_SECRET_KEY.Values will be base64-encoded during upload, even if provided as plain text.
Step 2: Create Kubernetes Secret
To create the secret, make a file namedoidc-auth.yaml with your OIDC provider details:<client-id>: Your OIDC client ID<client-secret>: Your OIDC client secret<oidc-issuer-url>: Unique URL from your Identity Provider<yourdomain>: Your organization’s domain<random-string>: A securely generated random string for JWT signing
SambaNova provides the full registry URL and version number during handover. Contact your SambaNova representative for access credentials.
Ensure the
OIDC_REDIRECT_URI matches your UI domain’s callback endpoint: https://ui.<yourdomain>/web/auth/callbackStep 3: Apply the Secret
Step 4: Update sambastack.yaml
Add the OIDC configuration to your sambastack.yaml:See the SambaStack.yaml Reference for a full example.
Step 5: Apply the Configuration
Update your Helm deployment:Keycloak User Management
If using Keycloak as your primary authentication tool, refer to the Keycloak Server Administration Guide for details on configuring your authentication setup.Keycloak also supports the following:
- Login activity tracking: View, export, and filter user activity by event type (login, logout, register).
- LDAP integration: Federate multiple LDAP/AD servers in a single Keycloak realm and map LDAP user attributes to the Keycloak common user model.
