docs/content/integration/openid-connect/clients/jellyfin/index.md
{{% oidc-common %}}
This example makes the following assumptions:
https://jellyfin.{{< sitevar name="domain" nojs="example.com" >}}/https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/jellyfininsecure_secretSome of the values presented in this guide can automatically be replaced with documentation variables.
{{< sitevar-preferences >}}
The following example uses the Jellyfin SSO Plugin which is assumed to be installed when following this section of the guide.
To install the Jellyfin SSO Plugin for Jellyfin via the Web GUI:
Plugins section.Repositories tab.+ to add a repository.Jellyfin SSOhttps://raw.githubusercontent.com/9p4/jellyfin-plugin-sso/manifest-release/manifest.jsonSave.Ok to confirm the repository installation.The following YAML configuration is an example Authelia client configuration for use with Jellyfin which will operate with the application example:
identity_providers:
oidc:
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
## See: https://www.authelia.com/c/oidc
clients:
- client_id: 'jellyfin'
client_name: 'Jellyfin'
client_secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
public: false
authorization_policy: 'two_factor'
require_pkce: true
pkce_challenge_method: 'S256'
redirect_uris:
- 'https://jellyfin.{{< sitevar name="domain" nojs="example.com" >}}/sso/OID/redirect/authelia'
scopes:
- 'openid'
- 'profile'
- 'groups'
response_types:
- 'code'
grant_types:
- 'authorization_code'
access_token_signed_response_alg: 'none'
userinfo_signed_response_alg: 'none'
token_endpoint_auth_method: 'client_secret_post'
{{< callout context="caution" title="Important Note" icon="outline/alert-triangle" >}}
This configuration assumes Jellyfin administrators are part of the jellyfin-admins group, and
Jellyfin users are part of the jellyfin-users group. Depending on your specific group configuration, you will have
to adapt the AdminRoles and Roles nodes respectively. Alternatively you may elect to create a new authorization
policy in provider authorization policies then utilize that policy as the client authorization policy.
{{< /callout >}}
To configure Jellyfin there are two methods, using the Configuration File, or using the Web GUI.
However the following steps must be completed via the UI first regardless of which option you choose:
Catalog tab.SSO Authentication from the Authentication section.Install.Ok to confirm the plugin installation.{{< callout context="tip" title="Did you know?" icon="outline/rocket" >}}
Generally the configuration file is named SSO-Auth.xml.
{{< /callout >}}
To configure Jellyfin to utilize Authelia as an OpenID Connect 1.0 Provider, use the following configuration:
<?xml version="1.0" encoding="utf-8"?>
<PluginConfiguration xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<SamlConfigs />
<OidConfigs>
<item>
<key>
<string>authelia</string>
</key>
<value>
<PluginConfiguration>
<OidEndpoint>https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}</OidEndpoint>
<OidClientId>jellyfin</OidClientId>
<OidSecret>insecure_secret</OidSecret>
<Enabled>true</Enabled>
<EnableAuthorization>true</EnableAuthorization>
<EnableAllFolders>true</EnableAllFolders>
<EnabledFolders />
<AdminRoles>
<string>jellyfin-admins</string>
</AdminRoles>
<Roles>
<string>jellyfin-users</string>
<string>jellyfin-admins</string>
</Roles>
<EnableFolderRoles>false</EnableFolderRoles>
<EnableLiveTvRoles>false</EnableLiveTvRoles>
<EnableLiveTv>false</EnableLiveTv>
<EnableLiveTvManagement>false</EnableLiveTvManagement>
<LiveTvRoles />
<LiveTvManagementRoles />
<FolderRoleMappings />
<RoleClaim>groups</RoleClaim>
<OidScopes>
<string>groups</string>
</OidScopes>
<CanonicalLinks></CanonicalLinks>
<DisableHttps>false</DisableHttps>
<DoNotValidateEndpoints>false</DoNotValidateEndpoints>
<DoNotValidateIssuerName>false</DoNotValidateIssuerName>
</PluginConfiguration>
</value>
</item>
</OidConfigs>
</PluginConfiguration>
To configure Jellyfin to utilize Authelia as an OpenID Connect 1.0 Provider, use the following instructions:
Plugins section.SSO-Auth plugin.autheliahttps://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}jellyfininsecure_secretjellyfin-users, jellyfin-adminsjellyfin-adminsgroupsgroupspreferred_usernameSave.https://jellyfin.{{< sitevar name="domain" nojs="example.com" >}}/sso/OID/start/authelia.