mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-06 10:58:17 -05:00
[PR #18948] feat: Complete OAuth/OIDC Admin UI Configuration #25028
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/open-webui/open-webui/pull/18948
Author: @jmleksan
Created: 11/5/2025
Status: 🔄 Open
Base:
dev← Head:oauth-updated📝 Commits (10+)
a413865add ui elements and auths.py handlers for full set of oauth settings64d5b76fix config route response logic421dd69API & Frontend in synce3778e1all working, prep for client id and secret / provider values65cf437add additional oauth/oidc settings to admin general uidf623ffPersistentConfig entries exist for all settings, AdminConfig model updated to include the new settings, update_admin_config endpoint updated to handle saving the new settings, OAuth provider registration uses these settings when configuring the OIDC provider690a3abfix config init5c4e46aProperly initializing the OAuth config variables in config.py with correct paths2eea797Added the missing imports for these OAuth config variables4024db6working great hell yeah + improve input styling📊 Changes
5 files changed (+555 additions, -73 deletions)
View changed files
📝
backend/open_webui/config.py(+100 -68)📝
backend/open_webui/main.py(+34 -0)📝
backend/open_webui/routers/auths.py(+99 -4)📝
backend/open_webui/utils/oauth.py(+28 -0)📝
src/lib/components/admin/Settings/General.svelte(+294 -1)📄 Description
Pull Request Checklist
Before submitting, make sure you've checked the following:
devbranch.feat: Complete OAuth/OIDC Admin UI Configuration with PKCE SupportChangelog Entry
Description
This PR completes and brings up to date the comprehensive OAuth/OIDC admin UI configuration work originally started in #12945 by @taylorwilsdon.
What PR #12945 Set Out to Accomplish:
The original goal was to enable full OAuth/OIDC identity provider configuration through the administrative interface, allowing admins to manage OAuth parameters—including client credentials, provider details, claim mappings, and role/group logic—directly from the admin UI instead of managing environment variables.
This PR:
devbranch (rebased and resolved conflicts)Added
Changed
Fixed
Additional Information
Testing Performed
Testing across multiple scenarios:
Would also appreciate testing from people with other providers or scenarios.
Migration Notes
For existing deployments:
For new deployments:
Related Issues & PRs
Screenshots or Videos
Contributor License Agreement
By submitting this pull request, I confirm that I have read and fully agree to the Contributor License Agreement (CLA), and I am providing my contributions under its terms.
Acknowledgments
This work builds directly on the foundation laid by @taylorwilsdon in #12945. Credit for the original vision and architecture goes to them.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.