Authentication Overview
This guide provides technical details about authentication implementation in Deepdesk.
Authentication Methods
Deepdesk supports multiple authentication methods:
- SSO (Single Sign-On) - OAuth2 authorization code flow for platform integration
- Magic Link - Email-based temporary tokens for dashboard access
- API Key - Fallback method when SSO and magic links aren't possible
- JWT - Token-based authentication with shared secrets
Login Flow
The following diagram illustrates the complete authentication flow in Deepdesk, including SSO, Magic Link, and access request workflows:
This flow shows how Deepdesk handles different authentication scenarios:
- Existing Users: If the user is already logged in, the SDK loads immediately
- SSO Path: When the platform supports SSO, users authenticate through the OAuth2 flow
- Magic Link Path: For platforms without SSO, users receive a magic link via email
- Access Requests: New users go through an approval workflow before receiving their magic link
Documentation
SSO
Learn about the OAuth2 authorization code flow implementation for Single Sign-On:
- OAuth2 authorization code flow specification
- Platform SSO sequence diagram
- Step-by-step authentication process
- End-to-end login flow from agent perspective
- OAuth2 Roles - Automatic role assignment using OIDC
Magic Link Authentication
Learn about passwordless authentication using email-based magic links:
- Email-based temporary token authentication
- Access request and approval workflow
- Login flow diagram
- Security considerations
- Implementation details
API Key
Learn about API key authentication for platforms without OAuth2 support:
- Widget-based authentication flow
- Security considerations and risks
- Secret management
- Current platform usage (LiveEngage, Genesys WDE)
Permissions System
Learn about the technical implementation of Deepdesk's permissions system:
- Django permissions and content types architecture
- Group-based access control
- Provisioning and deployment
- Permission enforcement in API views
- Test data factories for access control testing