Audiobookshelf ↔ Authentik: OIDC Integration Guide
This guide will walk you through integrating Audiobookshelf with Authentik to enable Single Sign-On via OpenID Connect (OIDC).
Requirements
- A running instance of Audiobookshelf (latest recommended)
- A running instance of Authentik with admin access
Overview
- Create an OAuth2/OpenID provider + application in Authentik.
- Register Audiobookshelf redirect URIs in Authentik.
- Copy the Client ID / Client Secret (from Authentik) into Audiobookshelf.
- Configure OIDC in Audiobookshelf (auto-populate using discovery endpoint).
- Test login and troubleshoot as needed.
Step 1: Create an Application & Provider in Authentik
- Log into your Authentik admin interface.
- Go to Applications > Providers and click Create.
- Select OAuth2/OpenID Provider and click Next.
- Fill in:
- Name: Audiobookshelf OIDC (or anything you prefer)
- Authorization flow:
default-provider-authorization-implicit-consent
- Client Type: Confidential
- Redirect URIs:
- Signing Key: Self-signed or your chosen key.
-
Click Finish.
-
Navigate to Applications > Applications and click Create.
- Name: Audiobookshelf (or anything you prefer)
- Slug: audiobookshelf (keeps things simple)
- Provider: Select the provider created above (
Audiobookshelf OIDC
) - Policy Engine Mode: Any
- Launch URL: Your Audiobookshelf login page (e.g.,
https://abs.yoursite.com
)
-
Save the application.
Step 2: Copy client credentials & discovery info from Authentik
- In Authentik, go to the Provider you created for Audiobookshelf.
- Locate and copy the following values:
- Client ID
- Client Secret
- OpenID Configuration Issuer URL (or the discovery URL) — e.g.
or the.well-known
endpoint: Copy these; you’ll paste them into Audiobookshelf.
Step 3: Configure Audiobookshelf for OIDC
- Access Audiobookshelf as an admin.
- Navigate to Settings > Authentication.
-
Enable OpenID Connect Authentication.
-
Use Auto-populate (optional):
- In Issuer URL paste your Authentik issuer/discovery URL (see step 2) and click Auto-populate — Audiobookshelf will fill Authorization, Token, UserInfo and JWKS URLs automatically.
-
Fill any remaining fields:
- Client ID: (from Authentik)
- Client Secret: (from Authentik)
- Signing Algorithm:
RS256
- Button Text: (e.g., "Login with SSO" or "Sign in with Authentik")
- Allowed Mobile Redirect URIs:
- Auto Launch: Enable for auto-redirect, disable to show button.
- Auto Register: Enable if you want new users created on login.
Save settings.
Step 4: Test Your SSO Login
- Visit your Audiobookshelf login page.
- If auto-launch is enabled, you will be redirected to Authentik to log in.
- Otherwise, click the Login with SSO (or your chosen button text).
- Authenticate via Authentik and confirm access to Audiobookshelf.
Tip
If you misconfigure SSO and are locked out, visit
https://<your-audiobookshelf-url>/login/?autoLaunch=0
to force show the local login form.
Note
- Users: Each user must exist in Authentik. If Auto Register is enabled, users are created on first login in Audiobookshelf with limited permissions.
- Groups: If you wish to sync user groups, map claims accordingly in Authentik and verify
groups
claim handling in Audiobookshelf. - Mobile App: Ensure the extra mobile redirect URI is also added in the provider's allowed redirect URIs.
For more details:
- See the Audiobookshelf OIDC guide
- For advanced Authentik configuration, consult the Authentik documentation.