Zitadel
Zitadel is an open-source identity infrastructure platform designed for cloud-native environments. It provides multi-tenancy, customizable branding, passwordless authentication, and supports protocols like OpenID Connect, OAuth2, SAML2, and LDAP.
Zitadel was previously used in the NetBird quickstart script. If you have an existing Zitadel deployment, you can continue using it as a standalone IdP or migrate to the embedded IdP with Zitadel as a connector.
Connector Setup (Recommended)
Add Zitadel as a connector to the embedded IdP. This is the simplest approach for new deployments or when migrating from the previous quickstart.
Prerequisites
- NetBird self-hosted with embedded IdP enabled
- Zitadel instance (cloud or self-hosted)
Step 1: Create Application in Zitadel
- Log in to your Zitadel Console
- Navigate to your project (or create one)
- Click New in the Applications section
- Fill in:
- Name:
NetBird - Type:
Web
- Name:
- Click Continue
- Configure authentication:
- Authentication Method:
Code(not PKCE)
- Authentication Method:
- Leave redirect URIs empty for now
- Click Create
- Go to Token Settings and enable User Info inside ID Token
- Note the Client ID and generate a Client Secret
Step 2: Add Connector in NetBird
- Log in to your NetBird Dashboard
- Navigate to Settings → Identity Providers
- Click Add Identity Provider
- Fill in the fields:
| Field | Value |
|---|---|
| Type | Zitadel |
| Name | Zitadel (or your preferred display name) |
| Client ID | From Zitadel application |
| Client Secret | From Zitadel application |
| Issuer | Your Zitadel URL (e.g., https://your-instance.zitadel.cloud) |
- Click Save
Step 3: Configure Redirect URI
After saving, NetBird displays the Redirect URL. Copy this URL and add it to your Zitadel application:
- Return to Zitadel Console
- Go to your application → Redirect Settings
- Add the redirect URL from NetBird to Redirect URIs
- Click Save
Step 4: Test the Connection
- Log out of NetBird Dashboard
- On the login page, you should see a "Zitadel" button
- Click it and authenticate with your Zitadel credentials
- You should be redirected back to NetBird and logged in
Standalone Setup (Advanced)
Use Zitadel as your primary identity provider instead of NetBird's embedded IdP. This option gives you full control over authentication and user management, is recommended for experienced Zitadel administrators as it also requires additional setup and ongoing maintenance.
For most deployments, the embedded IdP is the simpler choice — it's built into NetBird, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the Connector Setup (Recommended) section above.
If you prefer not to self-host, Zitadel offers a managed cloud option at zitadel.com.
Prerequisites
- Zitadel instance (cloud or self-hosted) with SSL
- Docker and Docker Compose for NetBird
Step 1: Create and Configure Zitadel Application
- Navigate to Zitadel console
- Click Projects at the top menu, then click Create New Project
- Fill in:
- Name:
NETBIRD
- Name:

- Click Projects and select NETBIRD project
- Click New in Applications section
- Fill in:
- Name:
netbird - Type of Application:
User Agent
- Name:

- Click Continue and set:
- Authentication Method:
PKCE
- Authentication Method:

- Click Continue and configure:
- Redirect URIs:
https://<domain>/authhttps://<domain>/silent-authhttp://localhost:53000
- Post Logout URIs:
https://<domain>/
- Redirect URIs:

- Click Create and then Close
- Under Grant Types, select
Authorization Code,Device Code, andRefresh Token - Click Save

- Copy Client ID for later use
Step 2: Configure Token Settings
- Select the netbird application
- Click Token Settings in the left menu
- Configure:
- Auth Token Type:
JWT - Check Add user roles to the access token
- Auth Token Type:
- Click Save

Step 3: Configure Redirect Settings (Development Only)
This step is only for development mode without SSL.
- Click Redirect Settings in the left menu
- Toggle Development Mode
- Click Save

Step 4: Create Service User
- Click Users in the top menu
- Select Service Users tab
- Click New
- Fill in:
- User Name:
netbird - Name:
netbird - Description:
Netbird Service User - Access Token Type:
JWT
- User Name:
- Click Create

- Click Actions in the top right corner
- Click Generate Client Secret
- Copy ClientSecret for later use

Step 5: Grant User Manager Role
- Click Organization in the top menu
- Click + in the top right corner
- Search for
netbirdservice user - Check Org User Manager checkbox
- Click Add

Step 6: Configure NetBird
Your authority OIDC configuration will be available at:
https://<YOUR_ZITADEL_HOST_AND_PORT>/.well-known/openid-configuration
Double-check if the endpoint returns a JSON response by calling it from your browser.
Set properties in the setup.env file:
NETBIRD_AUTH_OIDC_CONFIGURATION_ENDPOINT="https://<YOUR_ZITADEL_HOST_AND_PORT>/.well-known/openid-configuration"
NETBIRD_USE_AUTH0=false
NETBIRD_AUTH_CLIENT_ID="<CLIENT_ID>"
NETBIRD_AUTH_SUPPORTED_SCOPES="openid profile email offline_access api"
NETBIRD_AUTH_AUDIENCE="<CLIENT_ID>"
NETBIRD_AUTH_REDIRECT_URI="/auth"
NETBIRD_AUTH_SILENT_REDIRECT_URI="/silent-auth"
NETBIRD_AUTH_DEVICE_AUTH_PROVIDER="hosted"
NETBIRD_AUTH_DEVICE_AUTH_CLIENT_ID="<CLIENT_ID>"
NETBIRD_AUTH_DEVICE_AUTH_AUDIENCE="<CLIENT_ID>"
NETBIRD_MGMT_IDP="zitadel"
NETBIRD_IDP_MGMT_CLIENT_ID="netbird"
NETBIRD_IDP_MGMT_CLIENT_SECRET="<CLIENT_SECRET>"
NETBIRD_IDP_MGMT_EXTRA_MANAGEMENT_ENDPOINT="https://<YOUR_ZITADEL_HOST_AND_PORT>/management/v1"
NETBIRD_MGMT_IDP_SIGNKEY_REFRESH=true
Step 7: Continue with NetBird Setup
You've configured all required resources in Zitadel. Continue with the NetBird Self-hosting Guide.
Migrating from Zitadel Quickstart
If you deployed NetBird using the previous quickstart script with Zitadel:
Option A - Keep using Zitadel standalone: Continue with your existing setup. No changes needed.
Option B - Add Zitadel as connector to embedded IdP:
- Deploy new NetBird version with embedded IdP
- Add your existing Zitadel as a connector (follow connector setup above)
- Users can continue logging in with Zitadel
- Optionally create local user accounts as fallback
Option C - Migrate fully to embedded IdP:
- Export user list from Zitadel
- Deploy new NetBird version with embedded IdP
- Recreate users in NetBird Dashboard
- Decommission Zitadel when ready
Troubleshooting
"Invalid redirect URI" error
- Verify the redirect URI exactly matches what's configured
- Check for trailing slashes
- Ensure the application type is correct (User Agent for Dashboard)
"Token validation failed" error
- Verify the issuer URL is correct
- Ensure User Info inside ID Token is enabled
- Check that the audience matches your client ID
Service user authentication fails
- Verify the client secret was copied correctly
- Ensure the service user has Org User Manager role
Device auth not working
- Ensure Device Code grant type is enabled
- Verify PKCE is configured for the application

