Authorization Code
flow with Client Secret
. In this version of the flow, your client secret is stored security in the LangSmith platform (not on the frontend) and used for authentication and establishing auth sessions.
Authorization Code
flow with Client Secret
.OIDC
, email
, and profile
scopes to LangSmith. We use these to fetch the necessary user information and email for your users.https://<host>/api/v1/oauth/custom-oidc/callback
, where host is the domain or IP you have provisioned for your LangSmith instance. This is where your IdP will redirect the user after they have authenticated.oauthClientId
, oauthClientSecret
, hostname
, and oauthIssuerUrl
in your values.yaml
file. This is where you will configure your LangSmith instance.https
.platform-backend
service and can be added using platformBackend.deployment.extraEnv
in Helm.OAUTH_SESSION_MAX_SEC
, which may require including the offline_access
scope by adding to oauthScopes
(Helm) or OAUTH_SCOPES
(Docker)OAUTH_SESSION_MAX_SEC
(default 1 day) can be overridden to a maximum of one week (604800
)OAUTH_OVERRIDE_TOKEN_EXPIRY="true"
will take OAUTH_SESSION_MAX_SEC
as the session length, ignoring the identity token expirationCreate Credentials → OAuth client ID
Web application
as the Application type
and enter a name for the application e.g. LangSmith
Authorized Javascript origins
put the domain of your LangSmith instance e.g. https://langsmith.yourdomain.com
Authorized redirect URIs
put the domain of your LangSmith instance followed by /api/v1/oauth/custom-oidc/callback
e.g. https://langsmith.yourdomain.com/api/v1/oauth/custom-oidc/callback
Create
, then download the JSON or copy and save the Client ID
(ends with .apps.googleusercontent.com
) and Client secret
somewhere secure. You will be able to access these later if needed.
OAuth consent screen
from the navigation menu on the left
Internal
. If you select Public
, anyone with a Google account can sign in.Application name
. This name is shown to users on the consent screen when they sign in. For example, use LangSmith
or <organization_name> SSO for LangSmith
.config
values that would be used for Kubernetes configuration:
oauthClientId
: Client ID
(ends with .apps.googleusercontent.com
)oauthClientSecret
: Client secret
hostname
: the domain of your instance e.g. https://langsmith.yourdomain.com
(no trailing slash)oauthIssuerUrl
: https://accounts.google.com
oauth.enabled
: true
authType
: mixed
Client Secret
if possible (previously we didn’t support this). However, if your IdP does not support this, you can use the Authorization Code with PKCE
flow.
This flow does not require a Client Secret
- see the flow above for the alternative that does.
Authorization Code with PKCE
flow (Google does not support this flow for example, but see below for an alternative configuration that Google supports). This is often displayed in your OAuth Provider as configuring a “Single Page Application (SPA)”OIDC
, email
, and profile
scopes to LangSmith. We use these to fetch the necessary user information and email for your users.http://<host>/oauth-callback
, where host is the domain or IP you have provisioned for your LangSmith instance. This is where your IdP will redirect the user after they have authenticated.oauthClientId
and oauthIssuerUrl
in your values.yaml
file. This is where you will configure your LangSmith instance.