mirror of
https://github.com/rustdesk/doc.rustdesk.com.git
synced 2026-04-05 07:16:03 +00:00
1.7 KiB
1.7 KiB
title, weight, description, keywords
| title | weight | description | keywords | ||||||
|---|---|---|---|---|---|---|---|---|---|
| OIDC | 16 | Configure OpenID Connect in RustDesk Server Pro so users can sign in with identity providers such as Google, Okta, Azure, GitHub, GitLab, and others. |
|
Use OpenID Connect in RustDesk Server Pro to let users sign in with an existing identity provider instead of separate local credentials.
- Use your existing
Google,Okta,Facebook,Azure,GitHub,GitLab, etc. accounts to easily create and log in to yourRustDesk Proaccount. - For the specification see OpenID Connect Core 1.0 incorporating errata set 1.
What is OIDC in RustDesk Server Pro?
OIDC lets RustDesk Server Pro delegate login to an external identity provider. Instead of managing separate RustDesk passwords, users authenticate with the provider you already use for identity, access control, and account lifecycle.
When should you use OIDC instead of local accounts?
- You already use Azure, Okta, GitHub, GitLab, Google, or another OIDC-capable provider
- You want centralized password policies and single sign-on
- You want to disable or deprovision user access from one identity system
- You want RustDesk account creation and login tied to your existing organization identity
OIDC setup checklist
- Create an application in your identity provider.
- Collect the client ID, client secret, issuer URL, and any provider-specific endpoints.
- Add the provider settings to RustDesk Server Pro.
- Test sign-in with a non-admin account before rolling it out broadly.
Provider examples
{{% children depth="4" showhidden="true" %}}