Configuring Providers
Step-by-step guide to configure OAuth providers in Supascale.
This guide walks you through configuring OAuth providers for your Supabase projects in Supascale.
Prerequisites
Before configuring a provider, you need to:
- Create an OAuth application in the provider's developer console
- Note down the Client ID and Client Secret
- Have your Supascale project created and running
Configuration Steps
Step 1: Navigate to Auth Settings
- Open your project in Supascale
- Go to Settings > Auth Providers
- You'll see a grid of available providers
Step 2: Select a Provider
Click on the provider you want to configure. A configuration dialog will appear.
Step 3: Enter Credentials
Fill in the required fields:
- Client ID: The public identifier for your OAuth app
- Client Secret: The secret key (never share this publicly)
Some providers require additional configuration:
- GitLab: Optionally specify your self-hosted GitLab URL
- Azure AD: Enter your Tenant URL
- Keycloak: Enter your Realm URL
Step 4: Copy the Redirect URL
The dialog displays the callback URL you need to configure in your provider's developer console:
http://your-domain:PORT/auth/v1/callback
Copy this URL and add it to your OAuth app's authorized redirect URIs.
Step 5: Save and Apply
- Click Save to store the configuration
- Supascale encrypts and saves your credentials
- The project configuration is updated
Important: Your project needs to restart for OAuth changes to take effect. If your project is running, you'll see a warning about this.
Enabling/Disabling Providers
You can enable or disable configured providers without removing the credentials:
- Go to Settings > Auth Providers
- Click on a configured provider
- Toggle the Enabled switch
- Save the changes
Removing a Provider
To completely remove a provider:
- Go to Settings > Auth Providers
- Click on the configured provider
- Click Remove Configuration
- Confirm the removal
Security Notes
- Client secrets are encrypted using AES-256 before storage
- Secrets are masked in the UI (showing only first/last 4 characters)
- Configuration changes are logged in the activity history
- Never share your client secrets or commit them to version control
Example: Configuring Google OAuth
- Go to Google Cloud Console
- Create a new project or select existing
- Navigate to APIs & Services > Credentials
- Click Create Credentials > OAuth client ID
- Select Web application
- Add your Supascale callback URL to Authorized redirect URIs
- Copy the Client ID and Client Secret
- Enter them in Supascale's Google provider configuration
- Save and restart your project
Troubleshooting
Provider not working after configuration
- Ensure your project has restarted
- Verify the callback URL matches exactly in both Supascale and the provider console
- Check that the OAuth app is in production mode (not test mode)
Invalid redirect URI error
- The callback URL in the provider console must match exactly
- Include the correct port number
- Ensure no trailing slashes
Authentication fails silently
- Check the Supabase Auth logs in your project
- Verify the client secret hasn't been rotated in the provider console