Skip to main content
Idun Agent Platform supports two authentication modes for the Manager and a per-agent SSO layer for engine route protection. Role-based access control (RBAC) governs what authenticated users can do within each workspace.

Authentication modes

The Manager supports two mutually exclusive authentication modes, controlled by the AUTH__DISABLE_USERNAME_PASSWORD environment variable.
The default mode. Users register and log in with email and password.
  • POST /api/v1/auth/basic/signup to register
  • POST /api/v1/auth/basic/login to log in
  • Passwords are hashed with bcrypt
No additional configuration is required. This mode is active when AUTH__DISABLE_USERNAME_PASSWORD is false (the default).

Session management

Both modes use signed HTTP-only cookies for session management.
SettingEnvironment variableDefault
Session secretAUTH__SESSION_SECRETRequired, min 32 characters
Session TTLAUTH__SESSION_TTL_SECONDS86400 (24 hours)
Secure cookies (HTTPS)AUTH__COOKIE_SECUREfalse

Role-based access control

Each workspace has its own set of members with assigned roles. Roles determine what actions a user can perform within that workspace.
RoleLevelCapabilities
Owner4Full control. Can delete the workspace, manage all members including other owners
Admin3Can invite and remove members, update roles (except owners), manage all resources
Member2Can create, read, update, and delete agents and resources within the workspace
Viewer1Read-only access to agents and resources
Roles are hierarchical. A higher-level role includes all permissions of lower-level roles.

Workspace invitations

Admins and owners can invite users by email. The invitation specifies a role and is consumed when the invited user signs up or logs in:
  1. Admin sends an invitation for user@company.com with role member
  2. When that user signs up (via either auth mode), the invitation is consumed
  3. The user is added to the workspace with the assigned role
  4. If it is the user’s first workspace, it becomes their default

Per-agent SSO (engine route protection)

Separate from Manager authentication, the engine can enforce OIDC JWT validation on agent API routes. When enabled, clients must provide a valid JWT in the Authorization header to call agent endpoints. Protected routes:
  • /agent/invoke
  • /agent/stream
  • /agent/copilotkit/stream

SSO config

SSO/OIDC configurationNavigate to the SSO page to manage SSO configurations for your workspace.SSO pageClick Add SSO config and fill in the issuer URL, client ID, and allowed domains.User managementThe User Management page shows a table of workspace members with their assigned roles.Workspace users listFrom this page you can invite new users by email and assign them a role: Owner, Admin, Member, or Viewer. You can also update an existing member’s role or remove them from the workspace.

Supported providers

The Manager currently supports Google OIDC for SSO authentication, configured through environment variables. GitHub and Azure AD are planned as future providers. For per-agent SSO, the engine validates JWTs against any OIDC-compliant provider’s JWKS endpoint. The tested and supported provider is:
  • Google Workspace (issuer: https://accounts.google.com)
Domain and email allowlists are applied after JWT signature verification. A valid token from an allowed provider is still rejected if the email domain or address is not in the allowlist.
Last modified on March 22, 2026