Authentication Overview
Opik supports multiple authentication methods to integrate with your organizationβs identity management infrastructure. This guide helps you understand the available options and choose the right approach for your needs.
Authentication features are available on Enterprise plans. These features are not available in open-source deployments. Reach out if you want to enable SSO or JWT authentication for your Opik deployment.
Authentication methods
Opik supports multiple authentication methods for enterprise organizations. For configurable UI access, you can set up SAML SSO or OIDC SSO to integrate with your identity provider. Other available methods include base authentication (username/password), Google OAuth, GitHub OAuth, and LDAP (for on-premises deployments). JWT Authentication is available separately for SDK and programmatic access. Unlike SAML SSO and OIDC SSO, JWT Authentication is designed for service-to-service and API integrations, not for user interface login.
Choosing an authentication method
Use this decision guide to select the right authentication method:
Use SAML SSO when:
- Your organization already uses an enterprise identity provider (Okta, Azure AD, OneLogin, etc.)
- You need automatic workspace assignment based on user attributes/groups
- You require centralized user lifecycle management (auto-provisioning/deprovisioning)
- Your security policies mandate SAML-based authentication
Use OIDC SSO when:
- Your identity provider supports OpenID Connect but not SAML
- You prefer a simpler, more modern protocol
- Youβre using a cloud-native identity solution
- You donβt need attribute-based workspace sync
Use JWT Authentication when:
- You need programmatic/API access from backend services
- Youβre building custom authentication flows
- You want to integrate with existing JWT-based systems
- You need service-to-service authentication
Multiple methods: You can configure multiple authentication methods for your organization. For example, use SAML for human users and JWT for service accounts.
Common prerequisites
Before configuring any authentication method, ensure you have:
- Admin access: You must be an organization administrator.
- Enterprise plan: SSO features require an Enterprise subscription.
- Domain ownership: You should control the email domain(s) you want to use for SSO.
- IdP access (for SSO): Admin access to your identity provider to configure the integration.
Glossary
Understanding these terms will help you configure authentication:
General terms
SAML-specific terms
OIDC-specific terms
JWT-specific terms
Authentication flow comparison
SAML authentication flow
OIDC authentication flow
JWT authentication flow
Configuration guides
Detailed setup instructions are available for each authentication method:
Configure SAML-based single sign-on with enterprise identity providers.
Set up OpenID Connect authentication for your organization.
Configure JWT-based authentication for programmatic access.
Security considerations
Domain verification
When configuring SSO, you associate email domains with your organization. This ensures:
- Users with those email domains are directed to your SSO configuration.
- Only users who authenticate through your IdP can access the organization.
Important: Ensure you only configure domains you own or control. Misconfigured domains could prevent legitimate users from accessing their accounts.
Certificate management
For SAML authentication:
- Store IdP certificates securely.
- Monitor certificate expiration dates.
- Plan for certificate rotation to avoid authentication disruptions.
Key rotation
For JWT authentication:
- Use JWKS endpoints when possible for automatic key rotation.
- If using static keys (on-prem only), establish a key rotation schedule.
- Monitor JWKS endpoint availability.
Troubleshooting
Common authentication issues and solutions:
Next steps
- Configure SAML SSO for enterprise identity providers.
- Set up OIDC for OpenID Connect authentication.
- Configure JWT authentication for programmatic access.