Auth0
Configure SSO with Auth0 (OIDC or SAML)
1. Create an application in Auth0
- Log in to the Auth0 Dashboard.
- Go to Applications → Applications → Create Application.
- Choose Regular Web Application and create it.
- Note your Domain, Client ID, and Client Secret.
2. Configure Dokploy
- In Dokploy, go to Settings (or Organization / Security in Enterprise).
- Enable SSO and choose OpenID Connect.
- Enter:
- Provider: myorg-name-auth0 (Unique)
- Issuer URL:
https://YOUR_AUTH0_DOMAIN/(Make sure add the trailing slash) - Domain: the domain users use to authenticate via Auth0 (e.g. your organization domain like
acme.com), not the Dokploy instance URL - Client ID: from Auth0 application
- Client Secret: from Auth0 application
- Scopes: openid email profile
- Save.
3. Configure Auth0
- In your application, go to Settings.
- Set Allowed Callback URLs to your Dokploy URL, for example:
https://your-dokploy-domain.com/api/auth/callback/myorg-name-auth0
- Set Allowed Logout URLs to:
https://your-dokploy-domain.com
- Set Allowed Origins to:
https://your-dokploy-domain.com
- Save changes.
Troubleshooting (OIDC)
- Redirect URI mismatch — Ensure the callback URL in Dokploy matches exactly what is configured in Auth0 (including protocol and path).
- Invalid client — Double-check Client ID and Client Secret, and that the application is a web application.
- Scopes — Ensure Auth0 is configured to return
openidand, if required,emailandprofile.
1. Create a SAML application in Auth0
- Log in to the Auth0 Dashboard.
- Go to Applications → Applications → Create Application.
- Choose Regular Web Application and create it.
- In the application, go to Add Ons → enable SAML 2 Web App and configure it, in the settings specify this callback URL:
https://your-dokploy-domain.com/api/auth/sso/saml2/callback/myorg-name-auth0-saml. - Next & Save.
2. Configure Dokploy
- In Dokploy, go to Settings (or Organization / Security in Enterprise).
- Enable SSO and choose SAML.
- Enter:
- Provider: myorg-name-auth0-saml (unique name for this provider)
- Issuer URL: the Auth0 SAML Entity ID / Issuer located in
Add Onstab calledSAML 2 Web AppcalledEntity ID(e.g.urn:auth0:your-tenant:your-app) - SSO URL: the Auth0 SAML Single Sign-On URL located in
Add Onstab calledSAML 2 Web AppcalledSingle Sign-On URL(e.g.https://dev-ladsadb.us.auth0.com/samlp/wgJe9bWmwhVnuAC7eNtyUsiou4b6wxuf) - Certificate: download the certificate active (x509) from the
Add Onstab calledSAML 2 Web AppcalledIdentity Provider Certificateand paste it in theCertificatefield. - Federation Metadata XML: copy the Identity Provider Metadata XML from the certificate active and paste it in the
Metadata XMLfield. - Domain: the domain users use to authenticate via Auth0 (e.g. your organization domain like
acme.com), not the Dokploy instance URL
- Save.
3. Configure Auth0 (SAML)
- In your Auth0 SAML application, set the Application Callback URL (ACS URL) to your Dokploy SAML ACS URL, for example:
https://your-dokploy-domain.com/api/auth/sso/saml2/callback/myorg-name-auth0-saml
- In the SAML 2 Web App add-on, open Settings and paste the following JSON in the Settings (Application Settings) field. Replace
https://your-dokploy-domain.comwith your Dokploy base URL andmyorg-name-auth0-samlwith the exact same provider name you entered in Dokploy in step 2 (the callback URL path must match), so Dokploy can read email, display name, and other attributes:
{
"audience": "https://your-dokploy-domain.com/saml/metadata",
"recipient": "https://your-dokploy-domain.com/api/auth/sso/saml2/callback/myorg-name-auth0-saml",
"destination": "https://your-dokploy-domain.com/api/auth/sso/saml2/callback/myorg-name-auth0-saml",
"signResponse": true,
"signAssertion": true,
"nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
"nameIdentifierProbes": [
"email"
],
"mappings": {
"email": "email",
"displayName": "name",
"givenName": "given_name",
"surname": "family_name"
}
}- Save.
Troubleshooting (SAML)
- ACS URL mismatch — Ensure the callback/ACS URL in Auth0 matches exactly what Dokploy provides (including protocol and path).
- Certificate — Use the full x509 certificate from Auth0 (PEM format); ensure no extra spaces or line breaks.
- Entity ID — The Entity ID in Dokploy must match the Issuer/Entity ID configured in Auth0.
For help with your setup, contact us.