Environment Variables
To enable OIDC in your self-hosted Teable, configure these environment variables:Configuration Reference
| Variable | Description |
|---|---|
BACKEND_OIDC_CLIENT_ID | Client ID from your identity provider |
BACKEND_OIDC_CLIENT_SECRET | Client secret from your identity provider |
BACKEND_OIDC_CALLBACK_URL | Teable’s callback URL (must match IdP configuration) |
BACKEND_OIDC_AUTHORIZATION_URL | IdP’s authorization endpoint |
BACKEND_OIDC_TOKEN_URL | IdP’s token endpoint |
BACKEND_OIDC_USER_INFO_URL | IdP’s user info endpoint |
BACKEND_OIDC_ISSUER | IdP’s issuer identifier |
BACKEND_OIDC_OTHER | Additional options in JSON format (e.g., scopes) |
SOCIAL_AUTH_PROVIDERS | Include oidc to enable OIDC login button |
Identity Provider Setup Guides
The linked guides show Admin Panel SSO configuration for Cloud users’ single space.For self-hosted deployments, use these guides to set up your IdP application and obtain the required parameters, then configure them using the environment variables above for instance-wide global authentication.
Azure Entra ID
Microsoft Azure AD / Entra ID
Okta
Okta identity platform
Auth0
Auth0 identity platform
Google Workspace
Google Workspace accounts
OneLogin
OneLogin identity management
Authentik
Authentik open-source IdP
Enabling Multiple Auth Providers
You can enable multiple authentication methods:Important Notes
- HTTPS Required: All URLs must use HTTPS in production
- Callback URL Must Match: The callback URL in Teable must exactly match what’s configured in your IdP
- Restart Required: After changing environment variables, restart Teable for changes to take effect
- Secure Storage: Never commit secrets to version control; use environment variables or secret managers