Jitsi OpenID is an authentication adapter to provide jitsi the ability to use single sign on via OpenID Connect.
This guide is based of the docker setup from jitsi.
This image is available in the GitHub Container Registry:
ghcr.io/marcelcoding/jitsi-openid:latest
docker run \
-p 3000:3000 \
-e JITSI_SECRET=SECURE_SECRET \
-e JITSI_URL=https://meet.example.com \
-e JITSI_SUB=meet.example.com \
-e ISSUER_URL=https://id.example.com \
-e BASE_URL=https://auth.meet.example.com \
-e CLIENT_ID=meet.example.com \
-e CLIENT_SECRET=SECURE_SECRET \
--rm \
ghcr.io/marcelcoding/jitsi-openid:latest
# docker-compose.yaml
# ...
services:
# ...
jitsi-openid:
image: ghcr.io/marcelcoding/jitsi-openid:latest
restart: always
environment:
- 'JITSI_SECRET=SECURE_SECRET' # <- shared with jitsi (JWT_APP_SECRET -> see .env from jitsi),
# secret to sign jwt tokens
- 'JITSI_URL=https://meet.example.com' # <- external url of jitsi
- 'JITSI_SUB=meet.example.com' # <- shared with jitsi (JWT_APP_ID -> see .env from jitsi),
# id of jitsi
- 'ISSUER_URL=https://id.example.com' # <- base URL of your OpenID Connect provider
# Keycloak: https://id.example.com/auth/realms/<realm>
- 'BASE_URL=https://auth.meet.example.com' # <- base URL of this application
- 'CLIENT_ID=meet.example.com' # <- OpenID Connect Client ID
- 'CLIENT_SECRET=SECURE_SECRET' # <- OpenID Connect Client secret
# - 'ACR_VALUES=password email' # <- OpenID Context Authentication Context Requirements,
# space seperated list of allowed actions (OPTIONAL), see
# https://github.com/MarcelCoding/jitsi-openid/issues/122
# - 'SCOPES=openid email jitsi' # <- OpenID Scopes, space seperated list of scopes (OPTIONAL),
# default: openid email
# - 'VERIFY_ACCESS_TOKEN_HASH=false # <- explicitly disable access token hash verification (OPTIONAL),
# default: true
# - 'SKIP_PREJOIN_SCREEN=false' # <- skips the jitsi prejoin screen after login (default: true)
ports:
- '3000:3000'
# ...
To generate the JITSI_SECRET
you can use one of the following command:
cat /dev/urandom | tr -dc a-zA-Z0-9 | head -c128; echo
If you have problems understating this have a look here: MarcelCoding#80
# for more information see:
# https://github.com/jitsi/docker-jitsi-meet/blob/master/env.example
# weather to allow users to join a room without requiring to authenticate
#ENABLE_GUESTS=1
# fixed
ENABLE_AUTH=1
AUTH_TYPE=jwt
# should be the same as JITSI_ID of jitsi-openid environment variables
JWT_APP_ID=meet.example.com
# should be the same as JITSI_SECRET of jitsi-openid environment variables
JWT_APP_SECRET=SECRET
# fixed values
JWT_ACCEPTED_ISSUERS=jitsi
JWT_ACCEPTED_AUDIENCES=jitsi
# auth.meet.example.com should be the domain name of jitsi-openid,
# `/room/{room}` is the endpoint that's jitsi redirecting the user to
# `{room}` is is a placeholder, where jitsi inserts the room name
# jitsi-openid should redirect the user after a successfully authentication
# !! it is recommend to use ALWAYS https e.g. using a reverse proxy !!
TOKEN_AUTH_URL=https://auth.meet.example.com/room/{room}
The JWTs are populated using the data returned by your IDP. This includes the user id, email and name.
The sub
extracted from the prefered_username
field, if that isn't preset the sub
field is used.
The name
is extracted from the name
field, if that isn't preset a concatenation of given_name
, middle_name
and family_name
is used. If all tree of them are also not present the prefered_username
is used.
The affiliation
is straight up passed, without any modifications or alternatives. It can be used to restrict the permissions a user has in a specific room in jitsi. See https://github.com/jitsi-contrib/prosody-plugins/tree/main/token_affiliation for more information.
The picture (avatar) URL is delegated from the IDP to Jitsi.
Translations aren't respected: MarcelCoding#117 (comment)