Appearance
OIDC and SSO Status
See also: Identity and Access, Runtime Bootstrap and Access, Configuration Reference, Deploy and Operations, Admin Control Plane, ADR: Identity Foundation for Users, Teams, and API Key Ownership
This page exists because the current OIDC story is easy to overread. OIDC exists in the product, but it is not hardened production-grade SSO yet.
Current State
The live product supports pre-provisioned OIDC users and OIDC-flavored onboarding flows in the admin control plane.
What exists today:
- OIDC providers can be configured
- admins can pre-provision invited OIDC users
- config can pre-provision invited OIDC users by provider key
- first successful callback activates the invited user
- durable user and provider-link records are stored
What does not exist yet:
- a hardened standards-complete login flow
- a finished self-hosted local test-IdP story
- hardened declarative SSO-backed identity matching and claims policy
Development-Style Boundary
The current flow is intentionally development-style.
Today the implementation still:
- redirects
oidc_startinto the callback path directly - accepts callback identity through query parameters
- synthesizes a provider subject when one is not supplied
That is enough for slice-level testing and UI wiring. It is not enough to describe as finished enterprise SSO.
Practical Admin Impact
Admins should assume these boundaries:
- OIDC is usable for controlled environments and development-style testing
- OIDC is not the hardened final story for production sign-in policy
- local testing still lacks a checked-in IdP recommendation and workflow
- deploy docs should not imply that SSO-first bootstrap is solved
Planned Direction
The current forward path is visible in repo history.
- Pick and document a self-hosted test IdP story:
- Extend declarative config once hardened identity matching exists:
- Reopen or replace the standards-complete OIDC tracking issue before describing this as production-grade SSO:
- issue #29 is closed, but the current code still carries development-style callback behavior
That sequence matters. Declarative SSO-backed users depend on the hardened identity contract, not the other way around.
Local Test-IdP Gap
The repo does not yet ship a recommended local IdP stack for realistic OIDC testing.
That means:
- local validation remains ad hoc
- the current OIDC path is easier to demo than to validate against real provider quirks
- manual test guidance should stay conservative until the IdP choice is made
Current Gaps
- Self-hosted test-IdP research: issue #46
- Declarative SSO-backed identity config: issue #65
- Standards-complete OIDC tracking needs a reopened or successor issue because issue #29 is closed while the docs still describe a development-style boundary
What This Page Does Not Own
- user lifecycle and team rules: identity-and-access.md
- config field syntax for providers: configuration-reference.md
- admin UI capability map: admin-control-plane.md
- deploy topology and first-access behavior: deploy-and-operations.md, runtime-bootstrap-and-access.md