authentik
Connect Windshift to authentik for single sign-on using OpenID Connect.
Prerequisites
- Running Windshift instance with admin access
- Running authentik instance with admin access
Step 1: Open SSO Configuration in Windshift
- Navigate to Admin > Single Sign-On
- Click Add Provider
- Enter a display name (e.g. "authentik") — the slug auto-fills
- Copy the Callback URL shown in the dialog
Step 2: Create an OAuth2/OpenID Provider in authentik
- In authentik admin, go to Applications > Providers and click Create
- Select OAuth2/OpenID Provider and click Next
- Enter a name (e.g. "Windshift")
- Set Client type to Confidential
- Paste the Callback URL from Windshift into the Redirect URIs field
- Click Finish
- Copy the Client ID and Client Secret shown on the provider detail page
Step 3: Create an Application in authentik
- Go to Applications > Applications and click Create
- Enter a name (e.g. "Windshift") and note the slug (e.g.
windshift) - Select the provider you just created from the Provider dropdown
- Click Create
Step 4: Complete Windshift Configuration
- Back in the Windshift SSO dialog, paste the Client ID and Client Secret
- Set the Issuer URL to
https://auth.example.com/application/o/<app-slug>/— replaceauth.example.comwith your authentik domain and<app-slug>with the application slug from Step 3. Make sure to include the trailing slash - Leave Scopes as
openid email profile - Toggle the checkboxes as desired:
- Enable provider — makes the provider available on the login page
- Auto-provision — automatically creates accounts for new users
- Allow password login — lets provisioned users also set a password
- Trust IdP email verification — skips Windshift's own email verification
- Click Save Changes
Test the Connection
- In the Windshift SSO dialog, click Test Connection to verify everything is configured correctly
- Or sign out and use Sign in with authentik on the login page