Github OpenID Setup

This guide walks through a basic setup allowing Github users to authenticate with your Kasm deployment

Reference Docs:

Creating a Github OAuth App

  1. Login to Github and select Settings from the profile dropdown:

  2. Select Develop Settings.

  3. Select OAuth Apps, then click New OAuth App.

  4. Give the application a name (e.g Kasm), enter the URL of the deployment in the Homepage URL, and the Authorization callback to be https://<deployment hostname>/api/oidc_callback.


New OAuth Application

  1. Select Register Application.

  2. On the next page note the Client ID. It will be needed for upcoming configurations.

  3. Click Generate a new client secret and note the value. It will be needed for upcoming configurations.


Client ID an Client Secret

Kasm OpenID Config

  1. Log into the Kasm UI as an administrator.

  2. Select Access Management -> Authentication -> OpenID -> Add Config.

  3. Update the form with the following entries, using the Client ID and Client Secret gathered in the previous section.



Display Name

Continue with Github

Logo URL



Auto Login






Client ID

<Client ID From Github OAuth App>

Client Secret

<Client Secret from Github OAuth App>

Authorization URL

Token URL

User Info URL



Username Attribute


Groups Attribute





Kasm OIDC Configurations

  1. Click Save to save the changes.

Github Login Test

  1. Logout of the Kasm to display the login screen. The OpenID configuration should be shown.


Login Screen

  1. Click Continue with Github.

  2. The user is redirected to Github. Login if necessary. The first time the user utilizes the OpenID auth, they will be prompted to accept the access requested. Select Authorize


Github Auth

  1. Upon compleation, the user is logged into the Kasm app.