We recommend configuring an Identity Provider (IDP) to authenticate users to Kore. Kore will use the same provider for both CLI and UI access, and configuring an IDP removes the need to administer users directly in Kore.
If you are unable to use an IDP, you can configure users using a local password in Kore.
Kore supports Open ID Connect (OIDC) for integrating with identity providers, and you need to provide the following details when installing Kore:
- Client ID
- Server URL
- Client Secret
- Client Scopes to use (if the provider does not support the default scopes
offline_access- notably for Google Workspace / GSuite, you will need to set this to
If you need advice on integrating your existing single-sign on infrastructure with Kore, please get in touch and we will be happy to help out.
Kore's authentication system has been tested with Auth0, Okta, Google Identity and Microsoft Azure. Additional information is available for integrating the following providers: