Supported Identity Providers
NetBird integrates with the following identity providers:Auth0
Enterprise-grade authentication platform
Azure AD
Microsoft Azure Active Directory
Okta
Enterprise identity management
Keycloak
Open-source identity and access management
Google Workspace
Google’s enterprise identity platform
JumpCloud
Cloud directory platform
Zitadel
Cloud-native identity management
Authentik
Open-source identity provider
Dex
OpenID Connect identity provider
Configuration Overview
Each identity provider requires specific configuration parameters. The general setup process involves:Register NetBird Application
Create an application in your IdP’s admin console and obtain client credentials.
Auth0 Configuration
Auth0 integration requires the following configuration:Required Parameters
| Parameter | Description |
|---|---|
Audience | Auth0 API audience identifier |
AuthIssuer | Auth0 domain (e.g., https://your-tenant.auth0.com) |
ClientID | Application client ID from Auth0 |
ClientSecret | Application client secret from Auth0 |
GrantType | OAuth2 grant type (typically client_credentials) |
Example Configuration
Auth0 supports user creation, deletion, and app metadata updates through the Management API.
Azure AD Configuration
Microsoft Azure Active Directory integration parameters:Required Parameters
| Parameter | Description |
|---|---|
ClientID | Azure AD application client ID |
ClientSecret | Application client secret |
TenantID | Azure AD tenant ID |
TokenEndpoint | OAuth token endpoint URL |
GraphAPIEndpoint | Microsoft Graph API endpoint |
ObjectID | Azure AD object ID |
Example Configuration
Okta Configuration
Okta integration using API tokens:Required Parameters
| Parameter | Description |
|---|---|
Issuer | Okta domain (e.g., https://your-org.okta.com) |
ApiToken | Okta API token for management operations |
TokenEndpoint | OAuth token endpoint |
GrantType | OAuth2 grant type |
Example Configuration
Keycloak Configuration
Keycloak open-source IdP integration:Required Parameters
| Parameter | Description |
|---|---|
ClientID | Keycloak client ID |
ClientSecret | Client secret |
TokenEndpoint | Token endpoint URL |
AdminEndpoint | Keycloak admin API endpoint |
GrantType | OAuth2 grant type |
Example Configuration
Google Workspace Configuration
Google Workspace integration using service accounts:Required Parameters
| Parameter | Description |
|---|---|
ServiceAccountKey | Base64-encoded service account key JSON |
CustomerID | Google Workspace customer ID |
Setup Steps
Example Configuration
Additional IdP Options
JumpCloud
Cloud directory platform requiring only an API token:Zitadel
Cloud-native identity management:Authentik
Open-source identity provider with username/password authentication:Dex
OpenID Connect provider with gRPC API for user management:Dex uses a gRPC API for managing users in the password database and supports OpenID Connect for authentication.
User Management
Depending on your IdP, NetBird supports various user management operations:| Operation | Auth0 | Azure AD | Okta | Keycloak | JumpCloud | Zitadel | Authentik | Dex | |
|---|---|---|---|---|---|---|---|---|---|
| Get user by email | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Get user by ID | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Create user | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ | ✅ |
| Delete user | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Update metadata | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ | ❌ |
| Send invite | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ✅ | ❌ | ❌ |
Disabling Local Authentication
When using an external IdP, you can disable local email/password authentication:Troubleshooting
Common Issues
Authentication Fails with 401 Error
Authentication Fails with 401 Error
- Verify client credentials are correct
- Check that the token endpoint URL is accessible
- Ensure grant type matches your IdP configuration
- Validate that API tokens haven’t expired
Users Not Syncing
Users Not Syncing
- Confirm the management API has proper permissions
- Check network connectivity to IdP endpoints
- Review management server logs for detailed error messages
- Verify user query filters and scopes
Callback URL Mismatch
Callback URL Mismatch
- Ensure redirect URIs are registered in your IdP
- Check that the callback URL matches exactly (including protocol and port)
- Verify HTTPS is used for production environments
Security Best Practices
Next Steps
MFA Configuration
Configure multi-factor authentication
Posture Checks
Set up device posture checks