Available for Pro plan and above
Step 1: Create Authentication Provider in Teable
- Navigate to your Teable SSO settings
- Create a new authentication provider and name it Authentik and select OpenID Connect
Step 2: Access Authentik Admin Interface
- Log in to your Authentik instance admin interface
- The default URL is typically
https://your-authentik-domain/if/admin/
- Use your administrator credentials to log in
Step 3: Create a New Provider
- Navigate to Applications → Providers in the left menu
- Click Create button
- Select OAuth2/OpenID Provider
- Configure the provider settings:
Basic Settings
- Name: Teable SSO Provider
- Authorization flow: Select your preferred flow (typically default-authentication-flow)
- Client type: Confidential
- Client ID: (Auto-generated, you can customize if needed)
- Client Secret: (Auto-generated, copy this value)
Redirect URIs
- Redirect URIs/Origins (RegEx): Paste the Callback URL from Teable
- For exact match:
https://app.teable.io/api/auth/callback/authentik
- For regex pattern:
https://app\.teable\.io/api/auth/callback/.*
Advanced Settings
- Scopes: Make sure the following scopes are available:
- Subject mode: Based on the User’s hashed ID
- Include claims in id_token: Check this option
Click Finish to create the provider.
Step 4: Save Client Credentials
After creating the provider:
- Copy the Client ID from the provider details
- Copy the Client Secret (this is shown only once during creation)
- Paste both values into the Teable SSO configuration
Warning: Store the Client Secret securely. You can regenerate it later if needed.
Step 5: Create an Application
- Navigate to Applications → Applications in the left menu
- Click Create button
- Configure the application:
- Name: Teable
- Slug:
teable (or your preferred slug)
- Provider: Select the Teable SSO Provider you created in Step 3
- Launch URL: (Optional)
https://app.teable.io
- UI settings: (Optional) Upload Teable logo and customize appearance
Click Create to finish.
In Teable, fill in the following OAuth endpoints using your Authentik domain:
- Authorization URL:
https://{your-authentik-domain}/application/o/authorize/
- Token URL:
https://{your-authentik-domain}/application/o/token/
- User Info URL:
https://{your-authentik-domain}/application/o/userinfo/
- Issuer:
https://{your-authentik-domain}/application/o/{application-slug}/
Note: Replace {your-authentik-domain} with your actual Authentik instance domain and {application-slug} with the slug you configured (e.g., teable).
Create or Use Existing Flow
- Navigate to Flows & Stages → Flows
- You can use the default flows or create custom ones
- Typical flows needed:
- Authentication flow: For user login
- Authorization flow: For OAuth2/OIDC authorization
Assign Access Policy (Optional)
- Go back to your application settings
- Scroll to Policy / Group / User Bindings section
- Click Bind existing policy to restrict access based on:
- Groups: Only allow specific groups
- Users: Only allow specific users
- Custom policies: Create complex access rules
Review Scopes
- Navigate to Customization → Property Mappings
- Review the Scope Mappings for OAuth2/OIDC
- Ensure the following scopes include the right claims:
openid: Contains sub claim
email: Contains email and email_verified
profile: Contains name, given_name, family_name, etc.
Add Custom Claims
If you need custom user attributes:
- Go to Customization → Property Mappings
- Click Create → Scope Mapping
- Define your custom claims:
- Name: Custom claim name
- Scope name: Scope identifier (e.g.,
custom_claims)
- Expression: Python expression to extract user data
- Attach the scope to your provider
Step 9: Test SSO Login
You have two options to enable SSO login:
Option 1: Direct Authentication URL
- Use the authorization URL as your SSO login URL
- Users will be redirected to Authentik for authentication
Option 2: Domain Verification
- In Teable, configure domain verification
- Verify your custom domain
- Visit https://app.teable.io
- Click the SSO login button
- Enter your email address under the verified domain to log in
Additional Configuration (Optional)
- Navigate to Flows & Stages → Stages
- Create MFA stages (e.g., TOTP, WebAuthn, SMS)
- Go to Flows & Stages → Flows
- Edit your authentication flow
- Add MFA stages to the flow
- Configure MFA policies and bindings
Set Up User Enrollment
- Navigate to Flows & Stages → Flows
- Create or edit an enrollment flow
- Add stages for:
- User details collection
- Email verification
- Password setup
- Link the enrollment flow to your application
- Navigate to Flows & Stages → Policies
- Create password policies with requirements like:
- Minimum length
- Complexity requirements
- Password history
- Expiration rules
Enable Session Management
- Navigate to Events → Sessions
- Monitor active user sessions
- Configure session timeout settings in System → Settings
Custom Branding
- Navigate to Customization → Tenants
- Edit your tenant settings
- Customize:
- Logo and favicon
- Theme colors
- Footer text and links
- Users will see your branding when logging in through Authentik
Enable Audit Logging
- Navigate to Events → Logs
- Review authentication events and errors
- Set up notification rules for important events
- Configure event retention policies in System → Settings