A Traefik middleware plugin that secures your services with OIDC (OpenID Connect) authentication and claim-based authorization — without modifying your upstream applications.
Intercepts every request in Traefik and validates OAuth tokens — no changes needed in your upstream services.
Assert JWT claims with flexible AnyOf / AllOf rules and JSON-path selectors to control who can access what.
Enable PKCE for public clients (SPAs, CLIs) to protect against authorization code interception attacks.
Tokens are transparently refreshed before they expire, keeping sessions alive without user interruption.
Pass tokens or any JWT claim to your upstream service via custom headers using Go template expressions.
Skip authentication for public paths, specific hosts, or internal IP ranges using Traefik-style rules.
Serve your own branded HTML for 401 Unauthenticated and 403 Unauthorized responses.
Works with any OIDC-compliant provider. Tested with 7+ popular providers out of the box.
Works with any OIDC-compliant provider. Dedicated guides for:
Follow the Getting Started guide to add OIDC authentication to any Traefik-proxied service in minutes.
Read the Getting Started Guide →