SSO functionality is available with Dokploy Enterprise licenses. Self-hosted instances require a valid enterprise license to enable SSO features.
Supported Protocols
Dokploy supports two SSO protocols:OIDC (OpenID Connect)
Modern authentication protocol built on OAuth 2.0, ideal for web and mobile apps
SAML 2.0
Enterprise-standard protocol widely used in corporate environments
Supported Identity Providers
Dokploy has been tested with the following identity providers:- Okta (OIDC and SAML)
- Auth0 (OIDC)
- Azure AD / Microsoft Entra ID (OIDC and SAML)
- Google Workspace (OIDC)
- Keycloak (OIDC and SAML)
- OneLogin (OIDC and SAML)
- PingIdentity (SAML)
- JumpCloud (SAML)
- Any OIDC or SAML 2.0 compliant provider
Prerequisites
- Dokploy Enterprise license (self-hosted) or Dokploy Cloud account
- Owner role in your Dokploy organization
- Access to configure applications in your identity provider
- A verified domain for email-based user matching
Configuration Workflow
Step 1: Prepare Trusted Origins
Before configuring SSO, you must add your identity provider’s domain to the trusted origins list:Step 2: Configure Your Identity Provider
Create an application in your identity provider with these settings:OIDC Configuration
Redirect URI / Callback URL:openidemailprofile
idorsub- User unique identifieremail- User email addressemail_verified- Email verification statusnameorgiven_name- User display namepicture- Profile image URL (optional)
SAML Configuration
Assertion Consumer Service (ACS) URL:urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
idorNameID- User unique identifieremail- User email addressnameorfirstName- User display name
Step 3: Register SSO Provider in Dokploy
- OIDC Provider
- SAML Provider
Basic Configuration
- Provider ID: Unique identifier (e.g.,
okta-production) - Issuer URL: Your identity provider’s issuer URL
- Email Domains: Comma-separated domains (e.g.,
company.com,company.io)
OIDC Configuration
Enter these details from your identity provider:
If your provider supports OpenID Discovery, you can provide just the Discovery Endpoint and Dokploy will auto-configure the other endpoints.
Authentication Method
Choose the token endpoint authentication method:
client_secret_post(most common)client_secret_basic
PKCE (Optional)
Enable PKCE (Proof Key for Code Exchange) for enhanced security. Enabled by default.
Domain-Based Routing
Dokploy automatically routes users to the appropriate SSO provider based on their email domain:Each domain can only be associated with one SSO provider. If you try to configure multiple providers for the same domain, Dokploy will reject the configuration.
User Provisioning
When a user signs in via SSO for the first time:- User Creation: Dokploy creates a new user account automatically
- Organization Membership: The user is added to the organization that owns the SSO provider
- Role Assignment: New SSO users are assigned the “member” role by default
- Profile Sync: User profile data (name, email, avatar) is synced from the identity provider
Subsequent Logins
On subsequent logins:- User profile is updated with latest data from the identity provider
- Organization membership is maintained
- Role assignments are preserved (not overwritten by SSO)
Testing SSO Configuration
After configuring SSO:Managing SSO Providers
Updating Configuration
Update Issuer (if needed)
If changing the issuer URL, ensure the new URL is in your trusted origins list first
Removing SSO Provider
Troubleshooting
”Sign in with SSO” Button Not Visible
Self-hosted without enterprise license- SSO requires a valid Dokploy Enterprise license
- Purchase a license or request a trial at dokploy.com/enterprise
- Verify your license is properly activated in Settings > License
- Check that
enableEnterpriseFeaturesandisValidEnterpriseLicenseare both true
Authentication Fails
Issuer mismatch- Verify the issuer URL in Dokploy exactly matches your IdP’s issuer
- Check that the issuer is in your trusted origins list
- Common issue: trailing slash differences (
/vs no/)
- Verify the callback URL in your IdP matches:
- OIDC:
https://your-domain.com/api/auth/callback/oidc/{providerId} - SAML:
https://your-domain.com/api/auth/callback/saml/{providerId}
- OIDC:
- Provider ID must match exactly (case-sensitive)
- Verify the user’s email domain is listed in the SSO provider configuration
- Check for typos in domain names
- Ensure there are no extra spaces in the domain list
- Verify the IdP certificate is in correct PEM format
- Check certificate hasn’t expired
- Ensure certificate matches the one in your IdP configuration
- Verify signature algorithm matches in both IdP and Dokploy
- Check that “Want Assertions Signed” setting matches IdP configuration
- Ensure clock skew between servers is minimal (< 5 minutes)
User Profile Not Syncing
Attribute mapping incorrect- Verify attribute names match exactly what your IdP sends
- Use your IdP’s test/preview feature to see actual attribute names
- Common issue:
subvsuser_idvsidfor user identifier
- Ensure
openid,email, andprofilescopes are requested - Check that your IdP application grants these scopes
- Verify required attributes are included in SAML assertion
- Check attribute name mapping in your IdP
Security Best Practices
Certificate Management
- Rotate regularly: Update SAML certificates before expiration
- Use strong keys: Minimum 2048-bit RSA keys
- Secure storage: Certificates and private keys are encrypted in Dokploy’s database
Client Secret Management
- Never commit secrets: Keep client secrets out of version control
- Rotate regularly: Update client secrets periodically
- Limit permissions: Grant minimal required permissions in IdP
Domain Verification
- Verify domain ownership: Only configure domains you control
- Be specific: Use exact domains, not wildcards
- Monitor configuration: Regularly audit SSO providers and domains
Access Control
- Limit SSO admins: Only organization owners can configure SSO
- Review user provisioning: Monitor new users created via SSO
- Audit sign-ins: Enable logging in your identity provider
OIDC Configuration Schema
SAML Configuration Schema
API Integration
Next Steps
Two-Factor Authentication
Set up 2FA for enhanced security
Notifications
Set up security notifications
API Keys
Generate API keys for automation
Security Settings
Learn about security best practices