Skip to main content

Authentication Overview

This guide provides technical details about authentication implementation in Deepdesk.

Authentication Methods

Deepdesk supports multiple authentication methods:

  • SSO (Single Sign-On) - OAuth2 authorization code flow for platform integration
  • Magic Link - Email-based temporary tokens for dashboard access
  • API Key - Fallback method when SSO and magic links aren't possible
  • JWT - Token-based authentication with shared secrets

Login Flow

The following diagram illustrates the complete authentication flow in Deepdesk, including SSO, Magic Link, and access request workflows:

This flow shows how Deepdesk handles different authentication scenarios:

  1. Existing Users: If the user is already logged in, the SDK loads immediately
  2. SSO Path: When the platform supports SSO, users authenticate through the OAuth2 flow
  3. Magic Link Path: For platforms without SSO, users receive a magic link via email
  4. Access Requests: New users go through an approval workflow before receiving their magic link

Documentation

SSO

Learn about the OAuth2 authorization code flow implementation for Single Sign-On:

  • OAuth2 authorization code flow specification
  • Platform SSO sequence diagram
  • Step-by-step authentication process
  • End-to-end login flow from agent perspective
  • OAuth2 Roles - Automatic role assignment using OIDC

Learn about passwordless authentication using email-based magic links:

  • Email-based temporary token authentication
  • Access request and approval workflow
  • Login flow diagram
  • Security considerations
  • Implementation details

API Key

Learn about API key authentication for platforms without OAuth2 support:

  • Widget-based authentication flow
  • Security considerations and risks
  • Secret management
  • Current platform usage (LiveEngage, Genesys WDE)

Permissions System

Learn about the technical implementation of Deepdesk's permissions system:

  • Django permissions and content types architecture
  • Group-based access control
  • Provisioning and deployment
  • Permission enforcement in API views
  • Test data factories for access control testing