mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-07 03:18:23 -05:00
[GH-ISSUE #20733] issue: OIDC Client Secret Value not URL Encoding Special Characters #34807
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @atnjqt on GitHub (Jan 16, 2026).
Original GitHub issue: https://github.com/open-webui/open-webui/issues/20733
Check Existing Issues
Installation Method
Docker
Open WebUI Version
v0.7.2
Ollama Version (if applicable)
No response
Operating System
Amazon Linux 2023
Browser (if applicable)
No response
Confirmation
README.md.Expected Behavior
I just recently setup an AWS Beanstalk EC2 deployment for Open-WebUI, to keep all environment configurations as environment variables. Notably we are rolling OIDC OAUTH SSO login for this application and surprisingly we are finding that the OIDC Client Secret value is rejected at the IDP if containing a special character.
Actual Behavior
In my case, our client secret value was a
+symbol in it and only works if saving the environment variable value as URL encoded%2Bthe IDP authenticates and provides the token.Steps to Reproduce
Deploying using the following env vars helps confirms this, make sure your OAUTH OIDC generates a client secret with a special char (in this case, a plus character
+)Logs & Screenshots
Additional Information
If the team isn't want to handle this URL encoding at the backend layer, I would probably say at least helpful to add a troubleshooting bulletpoint on the docs here: https://docs.openwebui.com/troubleshooting/sso/
Or similar to the note under
WEB_BANNERyou might mentioned underCLIENT_SECRETthat the URL encoding should be handled by the IDP https://docs.openwebui.com/getting-started/env-configuration@owui-terminator[bot] commented on GitHub (Jan 16, 2026):
🔍 Similar Issues Found
I found some existing issues that might be related to this one. Please check if any of these are duplicates or contain helpful solutions:
by tlhr • Nov 21, 2025 •
bug💡 Tips:
This comment was generated automatically by a bot. Please react with a 👍 if this comment was helpful, or a 👎 if it was not.
@jagg2 commented on GitHub (Mar 9, 2026):
Still an issue.
Was able to work around it by changing out the client secret for one that didn't have any char requiring encoding
@tjbck commented on GitHub (Mar 25, 2026):
Intended upstream behaviour.
@jagg2 commented on GitHub (Mar 25, 2026):
@tjbck Who's upstream in this case?