We use cookies to make your experience better.
Learn how to use Google SSO with Coder.
This article walks you through setting up single sign-on to Coder using Google.
Configuring Coder's OpenID Connect feature requires you to provide three pieces of information from Google:
This guide will show you how to set up an app on Google and obtain the information you need to provide to Coder.
Before proceeding, please ensure that you've enabled and configured the Identity Platform for your Google Cloud account.
Navigate to your GCP console.
Go to APIs & Services > OAuth consent screen. Create a new app or edit an existing app, setting the following fields:
coder.your-domain.com
)Click Save and continue to proceed.
Under APIs & Services, go to Credentials.
Click Create Credentials and select OAuth Client ID.
When prompted for your Application type, choose Web Application.
Provide a Name for your application.
Under Authorized redirect URIs, click Add URI, and provide your URI
(e.g. coder.your-domain.com/oidc/callback
).
Click Create. Google shows you both your Client ID and Client Secret; copy both values and save them, since you'll need to provide these Coder.
Now that you've registered an app, you can provide the relevant Client ID, Client Secret, and Issuer to Coder.
Log into Coder, and go to Manage > Admin > Authentication.
Toggle the top-most field to OpenID Connect.
Provide the Client ID and Client Secret supplied by Google.
For the Issuer, provide accounts.google.com
.
Click Save preferences.
You can now use Google as an SSO provider with Coder.
If you'd like to enable session token refresh and define redirect options, set the following values in Coder's Helm chart and update your deployment:
oidc:
enableRefresh: true
redirectOptions: { access_type: offline, prompt: consent }
See an opportunity to improve our docs? Make an edit.