๐Ÿ”‘ SuperSaaS Auth Connector

Bridge Keycloak OIDC authentication with SuperSaaS user management.
Zero-friction onboarding โ€” users are created automatically and dropped straight into SuperSaaS.

Get started Configuration
๐Ÿชช

Keycloak OIDC

Authenticates users via Keycloak using the standard OpenID Connect authorization-code flow โ€” no custom SSO plumbing required.

๐Ÿ‘ค

Automatic User Provisioning

On first login the connector creates a matching account in SuperSaaS using the official Python API client, then forwards the user transparently.

๐Ÿณ

Container-Ready

Delivered as a single container image published to GitHub Packages. Drop it into any container runtime and configure via environment variables.

๐Ÿ”’

Session Security

Tokens are stored in a server-side signed session. Supports front-channel logout back to Keycloak with a single redirect.

โš™๏ธ

Twelve-Factor Config

Every tuneable โ€” SSO realm, API token, redirect URLs โ€” is driven by environment variables with sensible RaBe defaults that are easy to override.

๐Ÿงช

100 % Test Coverage

The entire codebase is covered by an integration test suite using pytest with mypy strict-mode type checking and ruff linting baked in.