Custom OIDC Configuration
- SambaStack on-prem
- SambaStack hosted
To integrate SambaStack with your organization’s identity provider, configure custom OIDC authentication.
These correspond to environment variables: Replace the placeholders with your actual values (all base64 encoded):Step 4: Update
Add the OIDC configuration to your
Step 1: Gather required values
| Source | Values |
|---|---|
| Provided by your OIDC provider | OIDC_CLIENT_ID, OIDC_CLIENT_SECRET, OIDC_ISSUER_URL, OIDC_REDIRECT_URI |
| Random string to be created | JWT_SECRET_KEY |
OIDC_CLIENT_ID, OIDC_CLIENT_SECRET, OIDC_ISSUER_URL, OIDC_REDIRECT_URI, and JWT_SECRET_KEY.Values will be base64-encoded during upload, even if provided as plain text.
Step 2: Create Kubernetes Secret
To create the secret, make a file namedoidc-auth.yaml with your OIDC provider details:<client-id>: Your OIDC client ID<client-secret>: Your OIDC client secret<oidc-issuer-url>: Unique URL from your Identity Provider<yourdomain>: Your organization’s domain<random-string>: A securely generated random string for JWT signing
SambaNova provides the full registry URL and version number during handover. Contact your SambaNova representative for access credentials.
Ensure the
OIDC_REDIRECT_URI matches your UI domain’s callback endpoint: https://ui.<yourdomain>/web/auth/callbackStep 3: Apply the Secret
Step 4: Update sambastack.yaml
Add the OIDC configuration to your sambastack.yaml:See the SambaStack.yaml Reference for a full example.
