Appearance
OIDC / SSO
ApiMeld supports single sign-on via OpenID Connect (OIDC). When enabled, a "Sign in with [Provider]" button appears on the login page alongside the username/password form.
One OIDC provider can be configured at a time.
Configuration
Go to Admin → Settings → Auth and enable OIDC:
| Field | Description |
|---|---|
| Enable OIDC | Show the SSO button on the login page |
| Provider Name | Label shown on the login button (e.g. "Google", "Azure AD", "Keycloak") |
| Authority URL | The OIDC discovery URL base (e.g. https://accounts.google.com) |
| Client ID | Your app's client ID from the provider |
| Client Secret | Your app's client secret (stored encrypted) |
Setting up common providers
Google
- Go to Google Cloud Console → APIs & Services → Credentials
- Create an OAuth 2.0 Client ID (Web application)
- Add your redirect URI:
https://tasks.example.com/api/auth/oidc/callback - Copy the Client ID and Client Secret into ApiMeld
- Set Authority URL to
https://accounts.google.com
Azure Active Directory / Entra ID
- In the Azure portal, register a new app in Azure Active Directory → App registrations
- Set the redirect URI to
https://tasks.example.com/api/auth/oidc/callback - Create a client secret under Certificates & secrets
- Set Authority URL to
https://login.microsoftonline.com/{tenant-id}/v2.0
Keycloak
- Create a new client in your Keycloak realm
- Set the redirect URI to
https://tasks.example.com/api/auth/oidc/callback - Set Authority URL to
https://your-keycloak.com/realms/{realm-name}
User provisioning
When a user signs in via OIDC for the first time, ApiMeld creates an account for them automatically. They are assigned the User role by default. An admin can promote them to Admin from Admin → Users.
Registration mode interaction
OIDC sign-in works regardless of the registration mode setting (invite-only or open). If you want to allow OIDC sign-in but block self-registration via the form, set registration to invite-only and enable OIDC.