Prerequisites
These instructions assume you have a working Zitadel organization and project setup already.Creating an Application in Zitadel
You need to configure an application in Zitadel:1
Create New Application
Open an existing project and in
Applications
click New
.2
Configure Application
Set the name to something memorable (eg. Pangolin).
3
Set Application Type
For
Type of application
choose Web
.4
Set Authentication Method
For
Authentication Method
choose Code
.5
Leave Redirect URIs Blank
Leave
Redirect URIs
blank for now. We’ll come back to this once the IdP is created.When you click create, you’ll be shown the
ClientSecret
and ClientId
. Make sure to save these somewhere secure - you won’t be able to see the Client Secret again.1
Configure Token Settings
Click
Token settings
then change Auth Token Type
to JWT
and check the User Info inside ID Token
box finally hit Save
.2
Note Endpoints
Open
URLs
and make note of:Authorization Endpoint
Token Endpoint
Configuring Identity Providers in Pangolin
In Pangolin, go to “Identity Providers” and click “Add Indentity Provider”. Select the OAuth2/OIDC provider option. “Name” should be set to something memorable (eg. Zitadel). The “Provider Type” should be set to the defaultOAuth2/OIDC
.
OAuth2/OIDC Configuration (Provider Credentials and Endpoints)
In the OAuth2/OIDC Configuration, you’ll need the following fields:The Client ID from your Zitadel application.
The Client Secret from your Zitadel application.
Use the
Authorization Endpoint
from your Zitadel application.Use the
Token Endpoint
from your Zitadel application.Token Configuration
You should leave all of the paths default. In the “Scopes” field, addopenid profile email
.
Set the “Identifier Path” to
preferred_username
for Zitadel integration.Returning to Zitadel
Lastly, you need to edit yourRedirect Settings
in your Zitadel application. Add the URL you copied to the Redirect URIs
, then hit the +
button and finally Save
. Your configuration should now be complete. You’ll now need to add an external user] to Pangolin, or if you have “Auto Provision Users” enabled, you can now log in using Zitadel SSO.