mirror of
https://github.com/databasus/databasus.git
synced 2026-04-06 00:32:03 +02:00
Feature Request: Support for OIDC / Keycloak Integration for Centralized Identity Management #194
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @diegosarina on 1/24/2026
Problem Statement: Currently, Databasus manages users and roles internally. For organizations with multiple tools, this creates "identity silos," requiring manual user provisioning, deprovisioning, and password management within the application itself.
The Case for OIDC (Keycloak): Implementing an OpenID Connect (OIDC) client would allow Databasus to integrate with enterprise identity providers like Keycloak, Okta, or Authelia.
Centralized Access Control: Admins can manage who has access to Databasus from a single point (SSO).
Security: Offload MFA (Multi-Factor Authentication) and password policies to a dedicated IAM (Identity and Access Management) tool.
Onboarding/Offboarding: Automatically grant or revoke access when a member joins or leaves the company via OIDC groups/claims.
Scalability: Essential for DevOps teams managing multiple environments where local user management becomes unfeasible.
Suggested Implementation: Add configuration flags (or environment variables) for
OIDC_ISSUER_URL,OIDC_CLIENT_ID, andOIDC_CLIENT_SECRET. Mapping OIDC groups to Databasus Workspaces/Roles would be the "gold standard." :)