feat: sso with keycloak as well as serveral bug fixes#7346
feat: sso with keycloak as well as serveral bug fixes#7346patrykattc wants to merge 86 commits intolangflow-ai:mainfrom
Conversation
What others do you require? Can't Keycloak provide support for the ones you need? |
If by "Keycloak" you mean "standardized SSO/OIDC/Oauth/SAML support" then yes it probably would. However, as you may know Keycloak is just one of many popular SSO platform, but there are many popular platforms in use such as Authentik, Authelia, Okta, etc. |
|
I see. Maybe it should be SAML directly instead, right? @patrykattc any reasons you picked Keycloak out of the gate? |
@ogabrielluiz @frostronic We are a full-stack development shop, covering everything from AI to Cloud to DevOps to backend to frontend. We provide complete solutions. Ex we build Varcel for clients. Part of our solution is SSO with keycloak. We deployed everything in Kubernetes and provided all the tools for the business application to be production-ready. I understand that many businesses utilize services like Varcel and other services, such as Clerk, for SSO. However, we would like to provide a comprehensive solution. The way we added this SSO feature means it can be extended to other providers with minimal effort. Additionally, this SSO PR is not just SSO; we also provided production-ready Dockerfiles, updated Prometheus observability, and addressed multiple bug fixes. We also have a brand-new, production-ready Helm chart that we are ready to share. We also have many additional features that are waiting for this merge. One of the features is the ability to provide user groups that allow for sharing global variables between users. This means instead of having an API key per user, you have an API key per group of users. We also added an agent-to-agent protocol. We are also iterating fast with additional features. We move fast. (We might also share Terraform/Terragrunt code to deploy the helm charts with databases to build your complete system) |
|
Hi, I didn't see any infor concerning MCP authentification. |
|
@Baptiste-ms, this PR is about integrating SSO with Langflow authentication. The SSO auth creates the same JWT token as the basic login form in Langflow. We have another PR waiting for this one to merge, which addresses additional authentication with the MCP server. Ex. We have an MCP for executing Kubernetes commands, and we only want DevOps users to have specific access to the kubectl commands. Additionally, we have two distinct DevOps roles: administrators and regular users. We control which commands DevOps can execute through the MCP using authentication, and we have different authentication methods based on the role as well. So once this is merged, we will push a lot more code for auth that is related to MCP. The basic mechanism is that we enhanced the LangFlow JWT token. |
|
Ok got it! Thank you for the clarification. |
|
Hey there, Thanks for your involvement |
|
I was just wondering if there have been any updates |
|
Hey @ncecere This will be merged soon. We are focused on fixing some bugs but we will look at this very soon. By the way, do you all have a guide on how to integrate this implementation with Okta? cc: @patrykattc @flefevre |
Just wanted to see if there have been any updates or movement on this |
|
If I do understand, The primary goal of this PR is to release the new authentication feature using Keycloak with OAuth2. Feature: Support OAuth2 (Keycloak) Authentication for Generated MCP Servers #8883 |
|
Hi all is there any progress here? We could really use SSO support |
|
+1, any progress on getting this merged? SSO would be really useful |
|
+1 |
|
Hello, I just wanted to see where things are for this |
|
Any idea if an input of your proposal is possible into the following PR to ensure your feature with user-defined provider will be possible? Feat/OAuth Single Sign-On Implementation with Google and Microsoft AD (Entra ID) #9020 |
|
Hi, any updates ? :( |
|
Hi @patrykattc and @ogabrielluiz, Thanks so much for all the work on this PR! SSO support is something a lot of people have been waiting for. I had a question about RBAC handling with Keycloak. Looking through the code, I couldn't find anything addressing role-based access control workflows. How would this work when someone leaves the company and we need to reassign their flows? It seems like we'd need a Superuser to handle all these transfers, which could be a pain in larger teams. I'm wondering if it might be worth considering Casbin instead, as it was discussed initially? It supports SSO and has built-in RBAC, plus it integrates directly with identity providers like Okta (via the Okta Role Manager) without needing Keycloak as a middle layer. For teams already using Okta or similar providers, this could be a simpler setup. My concern is that with Keycloak we'd still need to add Casbin anyway to handle RBAC properly, so we'd end up maintaining both. Just wanted to share this feedback - totally understand if there are architectural reasons for the current approach. |
|
@dix-icomys does SSO in Casbin work through Casdoor? |
|
@ogabrielluiz from what I see - yes. https://casdoor.org/docs/permission/overview However, that would require updating the whole codebase to add Casbin checks. I checked - Okta Role Manager is only available for Golang projects. Python has support only for the Default one: |
|
I don't mean to shift the focus - Casdoor isn't a silver bullet either. Please go with whatever approach you think works best. |
|
did you take a decision for the underlying technology? |
|
@ogabrielluiz could you give us the status of sso integration? There are several tickets on it, with different implementation . Thanks for letting us know. |
|
Here a new PR on this hot topic feature: SSO implementation #11399 |
|
Hey Guy, we can close this PR. |




This pull request introduces several significant enhancements that improve the Langflow platform's security, monitoring, and deployment capabilities. The changes span multiple areas of the codebase, from authentication to Docker configurations and monitoring.
Key Improvements
1. SSO Integration with Keycloak
2. Prometheus Monitoring Integration
3. Docker and Deployment Improvements
4. Logging and Debugging Enhancements
5. Bug Fixes
Technical Details
Testing
Documentation
These improvements enhance Langflow's security posture, operational visibility, and deployment flexibility, making the platform more robust for production use cases.