Authentication modes
The Manager supports two mutually exclusive authentication modes, controlled by theAUTH__DISABLE_USERNAME_PASSWORD environment variable.
- Username/password (default)
- Google OIDC SSO
The default mode. Users register and log in with email and password.
POST /api/v1/auth/basic/signupto registerPOST /api/v1/auth/basic/loginto log in- Passwords are hashed with bcrypt
AUTH__DISABLE_USERNAME_PASSWORD is false (the default).Session management
Both modes use signed HTTP-only cookies for session management.| Setting | Environment variable | Default |
|---|---|---|
| Session secret | AUTH__SESSION_SECRET | Required, min 32 characters |
| Session TTL | AUTH__SESSION_TTL_SECONDS | 86400 (24 hours) |
| Secure cookies (HTTPS) | AUTH__COOKIE_SECURE | false |
Role-based access control
Each workspace has its own set of members with assigned roles. Roles determine what actions a user can perform within that workspace.| Role | Level | Capabilities |
|---|---|---|
| Owner | 4 | Full control. Can delete the workspace, manage all members including other owners |
| Admin | 3 | Can invite and remove members, update roles (except owners), manage all resources |
| Member | 2 | Can create, read, update, and delete agents and resources within the workspace |
| Viewer | 1 | Read-only access to agents and resources |
Workspace invitations
Admins and owners can invite users by email. The invitation specifies a role and is consumed when the invited user signs up or logs in:- Admin sends an invitation for
user@company.comwith rolemember - When that user signs up (via either auth mode), the invitation is consumed
- The user is added to the workspace with the assigned role
- If it is the user’s first workspace, it becomes their default
Per-agent SSO (engine route protection)
Separate from Manager authentication, the engine can enforce OIDC JWT validation on agent API routes. When enabled, clients must provide a valid JWT in theAuthorization header to call agent endpoints.
Protected routes:
/agent/invoke/agent/stream/agent/copilotkit/stream
SSO config
- Manager UI
- Config file
SSO/OIDC configurationNavigate to the SSO page to manage SSO configurations for your workspace.
Click Add SSO config and fill in the issuer URL, client ID, and allowed domains.User managementThe User Management page shows a table of workspace members with their assigned roles.
From this page you can invite new users by email and assign them a role: Owner, Admin, Member, or Viewer. You can also update an existing member’s role or remove them from the workspace.


Supported providers
The Manager currently supports Google OIDC for SSO authentication, configured through environment variables. GitHub and Azure AD are planned as future providers. For per-agent SSO, the engine validates JWTs against any OIDC-compliant provider’s JWKS endpoint. The tested and supported provider is:- Google Workspace (issuer:
https://accounts.google.com)
Domain and email allowlists are applied after JWT signature verification. A valid token from an allowed provider is still rejected if the email domain or address is not in the allowlist.