This guide explains how to configure Single Sign-On (SSO) using the generic OpenID Connect (OIDC) protocol. Use this guide if your Identity Provider is not listed in the dedicated SSO menu but supports the OIDC standard (e.g., Keycloak, Auth0, Salesforce).
SSO is available on the Baserow Advanced Enterprise plan. You must have a valid license activated to configure these settings.

OpenID Connect (OIDC) allows you to connect almost any modern identity provider to Baserow.
To set this up, you need to register Baserow as a “Client” application in your Identity Provider (IdP) and then paste the credentials (Client ID, Secret, and Base URL) back into Baserow.
Since every IdP is different, you will need to consult your provider’s documentation. However, the general steps are always the same:
https://your-baserow.com/api/sso/oauth2/callback).Baserow automatically appends /.well-known/openid-configuration to the URL you provide to discover the endpoints. Do not include this suffix yourself.
| If your Discovery URL is… | You must enter… |
|---|---|
https://idp.example.com/.well-known/openid-configuration |
https://idp.example.com |
https://login.microsoftonline.com/{tenant}/v2.0/.well-known... |
https://login.microsoftonline.com/{tenant}/v2.0 |
https://auth0.com/realms/myrealm/.well-known... |
https://auth0.com/realms/myrealm |
This almost always means the Base URL is incorrect.
.well-known path? (Remove it)./? (Try removing it).[Your Base URL]/.well-known/openid-configuration into a browser and see a JSON response. If not, the URL is wrong.Some providers (like Azure AD) enforce PKCE (Proof Key for Code Exchange) for security. Baserow’s current OIDC implementation may not support strict PKCE enforcement for all providers.
OIDC is a layer on top of OAuth 2 specifically designed for authentication (logging in), whereas OAuth 2 is designed for authorization (accessing APIs). Baserow uses OIDC to verify who the user is.
Not currently. Baserow supports Just-In-Time (JIT) provisioning, meaning the account is created immediately upon login. However, we do not currently read OIDC “Claims” (like groups or roles) to assign permissions in Baserow. You must manually assign roles after the user joins.
Still need help? If you’re looking for something else, please feel free to make recommendations or ask us questions; we’re ready to assist you.
Contact support for questions about Baserow or help with your account.