-
Notifications
You must be signed in to change notification settings - Fork 7k
feat: sso with keycloak as well as serveral bug fixes #7346
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Will other implementations of SSO be support besides Keycloak? |
What others do you require? Can't Keycloak provide support for the ones you need? |
If by "Keycloak" you mean "standardized SSO/OIDC/Oauth/SAML support" then yes it probably would. However, as you may know Keycloak is just one of many popular SSO platform, but there are many popular platforms in use such as Authentik, Authelia, Okta, etc. |
I see. Maybe it should be SAML directly instead, right? @patrykattc any reasons you picked Keycloak out of the gate? |
@ogabrielluiz @frostronic We are a full-stack development shop, covering everything from AI to Cloud to DevOps to backend to frontend. We provide complete solutions. Ex we build Varcel for clients. Part of our solution is SSO with keycloak. We deployed everything in Kubernetes and provided all the tools for the business application to be production-ready. I understand that many businesses utilize services like Varcel and other services, such as Clerk, for SSO. However, we would like to provide a comprehensive solution. The way we added this SSO feature means it can be extended to other providers with minimal effort. Additionally, this SSO PR is not just SSO; we also provided production-ready Dockerfiles, updated Prometheus observability, and addressed multiple bug fixes. We also have a brand-new, production-ready Helm chart that we are ready to share. We also have many additional features that are waiting for this merge. One of the features is the ability to provide user groups that allow for sharing global variables between users. This means instead of having an API key per user, you have an API key per group of users. We also added an agent-to-agent protocol. We are also iterating fast with additional features. We move fast. (We might also share Terraform/Terragrunt code to deploy the helm charts with databases to build your complete system) |
Hi, I didn't see any infor concerning MCP authentification. |
@Baptiste-ms, this PR is about integrating SSO with Langflow authentication. The SSO auth creates the same JWT token as the basic login form in Langflow. We have another PR waiting for this one to merge, which addresses additional authentication with the MCP server. Ex. We have an MCP for executing Kubernetes commands, and we only want DevOps users to have specific access to the kubectl commands. Additionally, we have two distinct DevOps roles: administrators and regular users. We control which commands DevOps can execute through the MCP using authentication, and we have different authentication methods based on the role as well. So once this is merged, we will push a lot more code for auth that is related to MCP. The basic mechanism is that we enhanced the LangFlow JWT token. |
Ok got it! Thank you for the clarification. |
Hey there, Thanks for your involvement |
I was just wondering if there have been any updates |
Hey @ncecere This will be merged soon. We are focused on fixing some bugs but we will look at this very soon. By the way, do you all have a guide on how to integrate this implementation with Okta? cc: @patrykattc @flefevre |
Just wanted to see if there have been any updates or movement on this |
If I do understand, The primary goal of this PR is to release the new authentication feature using Keycloak with OAuth2. Feature: Support OAuth2 (Keycloak) Authentication for Generated MCP Servers #8883 |
This pull request introduces several significant enhancements that improve the Langflow platform's security, monitoring, and deployment capabilities. The changes span multiple areas of the codebase, from authentication to Docker configurations and monitoring.
Key Improvements
1. SSO Integration with Keycloak
2. Prometheus Monitoring Integration
3. Docker and Deployment Improvements
4. Logging and Debugging Enhancements
5. Bug Fixes
Technical Details
Testing
Documentation
These improvements enhance Langflow's security posture, operational visibility, and deployment flexibility, making the platform more robust for production use cases.