Skip to content

Add VoidAuth OIDC documentation#85

Open
HydrelioxGitHub wants to merge 2 commits into
rommapp:mainfrom
HydrelioxGitHub:oidc-voidauth
Open

Add VoidAuth OIDC documentation#85
HydrelioxGitHub wants to merge 2 commits into
rommapp:mainfrom
HydrelioxGitHub:oidc-voidauth

Conversation

@HydrelioxGitHub
Copy link
Copy Markdown

Documentation based on the Zitadel file.

@gantoine gantoine requested a review from Copilot May 12, 2026 10:58
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds a new OIDC provider guide for VoidAuth, intended to mirror the existing per-provider OIDC setup documentation.

Changes:

  • Added a new OIDC with VoidAuth setup guide with VoidAuth-side registration steps and RomM env var configuration.
  • Documented VoidAuth-specific discovery/metadata endpoint usage.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +12 to +32
VoidAuth installed and running via their [self-hosted deployment docs](https://voidauth.app/#/?id=quick-start). We will use the APP_URL provided in the compose.yml exemple for reference in this documentation : https://auth.example.com
Your RomM instance will be referenced as https://demo.romm.app .

## 2. Create a new app

Login as an admin in VoidAuth web interface. Create a new OIDC Apps (e.g. `RomM`).

- **Name**: `RomM`
- **Home Page URL**: `https://romm.example.com`
- **Logo URL**: `https://github.com/HydrelioxGitHub/romm-docs/blob/main/.github/resources/isotipo.png?raw=true`
- **Group**: You could add a group that the user must belong to get access to your RomM instance. If left empty, any user created in your VoidAuth instance will be allowed.
- **Skip Consent** and **MFA Required** : This options could be checked or not as you wish.
- **Client ID**: Generate an ID using the button
- **Auth Method**: `Client Secred Basic`
- **Client Secret**: Generate a secret using the button
- **Redirect URLs**: add `https://demo.romm.app/api/oauth/openid`
- **Response Types**: check `code`
- **Grant Types**: check `authorization_code` and `refresh_token`
- **Post Logout URL**: `https://demo.romm.app/`

Don't forget to click on the `Create` button to valid your app.

## 2. Create a new app

Login as an admin in VoidAuth web interface. Create a new OIDC Apps (e.g. `RomM`).
Comment thread docs/administration/oidc/voidauth.md Outdated

- **Name**: `RomM`
- **Home Page URL**: `https://romm.example.com`
- **Logo URL**: `https://github.com/HydrelioxGitHub/romm-docs/blob/main/.github/resources/isotipo.png?raw=true`
Comment on lines +12 to +32
VoidAuth installed and running via their [self-hosted deployment docs](https://voidauth.app/#/?id=quick-start). We will use the APP_URL provided in the compose.yml exemple for reference in this documentation : https://auth.example.com
Your RomM instance will be referenced as https://demo.romm.app .

## 2. Create a new app

Login as an admin in VoidAuth web interface. Create a new OIDC Apps (e.g. `RomM`).

- **Name**: `RomM`
- **Home Page URL**: `https://romm.example.com`
- **Logo URL**: `https://github.com/HydrelioxGitHub/romm-docs/blob/main/.github/resources/isotipo.png?raw=true`
- **Group**: You could add a group that the user must belong to get access to your RomM instance. If left empty, any user created in your VoidAuth instance will be allowed.
- **Skip Consent** and **MFA Required** : This options could be checked or not as you wish.
- **Client ID**: Generate an ID using the button
- **Auth Method**: `Client Secred Basic`
- **Client Secret**: Generate a secret using the button
- **Redirect URLs**: add `https://demo.romm.app/api/oauth/openid`
- **Response Types**: check `code`
- **Grant Types**: check `authorization_code` and `refresh_token`
- **Post Logout URL**: `https://demo.romm.app/`

Don't forget to click on the `Create` button to valid your app.
- **Grant Types**: check `authorization_code` and `refresh_token`
- **Post Logout URL**: `https://demo.romm.app/`

Don't forget to click on the `Create` button to valid your app.
```yaml
environment:
- OIDC_ENABLED=true
- OIDC_PROVIDER=VoidAuth

## 4. Test

Restart, navigate to `/login` and click the **Login with VoidAuth** button. You're redirected to VoidAuth → authenticate → bounced back and signed in!

# OIDC with VoidAuth

[VoidAuth](https://voidauth.app/) is an open-source SSO authentication and user management provider that stands guard in front of your self-hosted application. Before starting, read the [OIDC Setup overview](index.md), as it covers the RomM-side settings common to every provider.
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants