Trying to setup planka with authentik #738

Open
opened 2026-02-04 21:09:48 +03:00 by OVERLORD · 3 comments
Owner

Originally created by @dymdipii on GitHub (Jun 17, 2025).

I'm trying to setup planka oidc with authentik. I've added the environment variables mentioned in the planka documentation but I'm not seeing an sso login option on the planka login screen. The environment variables are definitely being set because when i try to enter any credentials, I'm told to use sso.

Can anyone with a working oidc config please share their configuration.

Originally created by @dymdipii on GitHub (Jun 17, 2025). I'm trying to setup planka oidc with authentik. I've added the environment variables mentioned in the planka documentation but I'm not seeing an sso login option on the planka login screen. The environment variables are definitely being set because when i try to enter any credentials, I'm told to use sso. Can anyone with a working oidc config please share their configuration.
Author
Owner

@Rawrnekton commented on GitHub (Jun 18, 2025):

After adding the env variables as documented it shows up on my end with no issues.
Please provide your configuration files, error messages in your browser/server logs and further information you think might help, because that is very little to go on.

i am currently using following as described here.

@Rawrnekton commented on GitHub (Jun 18, 2025): After adding the env variables as documented it shows up on my end with no issues. Please provide your configuration files, error messages in your browser/server logs and further information you think might help, because that is very little to go on. i am currently using following as described [here](https://docs.planka.cloud/docs/configuration/oidc).
Author
Owner

@anroots commented on GitHub (Jul 11, 2025):

I have Planka (1.24.1) working with Authentik logins. I'm using the Helm chart to install Planka, values for OIDC look like:

oidc:
  enabled: true
  clientId: REDACTED
  clientSecret: REDACTED
  issuerUrl: https://your.authentic.domain.com/application/o/planka/
  scopes:
    - openid
    - profile
    - email
  admin:
    ignoreRoles: false
    rolesAttribute: groups
    roles:
      - planka_admin

Helm/K8s sets these env vars to the Kubernetes pod:

--
    - name: OIDC_ENFORCED
      value: "true"
--
    - name: OIDC_CLIENT_ID
      valueFrom: REDACTED
--
    - name: OIDC_CLIENT_SECRET
      valueFrom: REDACTED
--
    - name: OIDC_ISSUER
      value: https://your.authentik.domain.com/application/o/planka/
    - name: OIDC_SCOPES
      value: openid profile email
    - name: OIDC_ADMIN_ROLES
      value: planka_admin
    - name: OIDC_ROLES_ATTRIBUTE
      value: groups
@anroots commented on GitHub (Jul 11, 2025): I have Planka (1.24.1) working with Authentik logins. I'm using the Helm chart to install Planka, values for OIDC look like: ```yaml oidc: enabled: true clientId: REDACTED clientSecret: REDACTED issuerUrl: https://your.authentic.domain.com/application/o/planka/ scopes: - openid - profile - email admin: ignoreRoles: false rolesAttribute: groups roles: - planka_admin ``` Helm/K8s sets these env vars to the Kubernetes pod: ```yaml -- - name: OIDC_ENFORCED value: "true" -- - name: OIDC_CLIENT_ID valueFrom: REDACTED -- - name: OIDC_CLIENT_SECRET valueFrom: REDACTED -- - name: OIDC_ISSUER value: https://your.authentik.domain.com/application/o/planka/ - name: OIDC_SCOPES value: openid profile email - name: OIDC_ADMIN_ROLES value: planka_admin - name: OIDC_ROLES_ATTRIBUTE value: groups ```
Author
Owner

@jorgecarleitao commented on GitHub (Jul 20, 2025):

I was also able to make it work, so imo this issue can be closed, or at least moved to a discussion

@jorgecarleitao commented on GitHub (Jul 20, 2025): I was also able to make it work, so imo this issue can be closed, or at least moved to a discussion
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/planka#738