Authentication and SSO¶
This page answers the practical question: what authentication model exists in the public core today, and where does third-party auth fit?
Community Edition Today¶
In a core-only deployment, OpenSOAR currently supports:
- local admin-managed analyst accounts
- username/password login
- JWT-backed UI/API sessions
- API keys for webhook and integration-style access
This is the default path documented in the public repository and the default local Docker workflow.
Third-Party Auth Status¶
Third-party analyst authentication is not part of the core-only deployment model.
The current public architecture treats SSO and external identity provider support as an optional enterprise plugin surface rather than a built-in core feature.
Practically, that means:
- if you run only
opensoar-core, you should expect local username/password auth - the first local admin is bootstrapped explicitly by the operator
- additional local accounts are created and managed by an admin
- if an optional enterprise package is installed, that package can extend the auth surface
- the core login UI can now discover optional external providers through runtime capabilities instead of hardcoded assumptions
OIDC / Keycloak / Casdoor¶
The current external-auth direction is OIDC-based provider integration through the optional enterprise path.
For users asking specifically about tools such as:
- Keycloak
- Casdoor
- other OIDC-compatible identity providers
the right model is: configure them as OIDC providers through the optional enterprise auth layer, not through a separate core-only auth mode.
What This Means Operationally¶
If you are working in the public core today:
- bootstrap the first local admin explicitly, for example with
opensoar-bootstrap-admin - sign in with that admin and create any additional local accounts from the Settings UI
- use local username/password login for those admin-managed accounts
- use API keys for webhook-style machine access
- treat external identity provider support as an optional deployment extension, not as part of the default core bootstrap path
Local Registration¶
Public self-registration is disabled by default.
That is intentional:
- OpenSOAR is typically deployed into internal or security-sensitive environments
- the default local account lifecycle is operator bootstrap plus admin-managed local accounts
- if you explicitly enable local self-registration for a dev or demo environment, new accounts are still created as
analystusers only
Core Roles¶
The core local account model exposes these roles:
adminanalystviewer
Enterprise-only roles such as tenant_admin and playbook_author belong to the optional enterprise auth layer and are not part of the default core account-registration path.