Registration Settings
Registration Modes
Anchor supports three registration modes:Enabled
Anyone can register and immediately access the system
Review
New registrations require admin approval before access
Disabled
New user registration is completely disabled
Viewing Registration Settings
Get the current registration configuration:mode field indicates the current registration policy.
Updating Registration Mode
Change the registration mode:"enabled"- Open registration"review"- Requires admin approval"disabled"- No new registrations
The registration mode only affects new registrations. Existing users can continue to log in regardless of the setting.
Registration Mode Details
Enabled Mode
Use Cases:
- Public Anchor instances
- Internal company deployments with trusted networks
- Personal or family instances
Review Mode
Use Cases:
- Private communities or organizations
- Instances requiring identity verification
- Controlling system growth and resource usage
Review mode provides a balance between accessibility and control. Users can self-register, but admins maintain oversight.
Disabled Mode
Use Cases:
- Fully private instances
- Organizations with strict access control
- Migration scenarios where you’re importing existing users
OpenID Connect (OIDC) Settings
Anchor supports OIDC for single sign-on with external identity providers.Viewing OIDC Configuration
enabled: Whether OIDC authentication is activeproviderName: Display name for the identity providerissuerUrl: OIDC issuer/discovery URLclientId: OAuth 2.0 client identifierhasClientSecret: Whether a client secret is configured (actual secret is never returned)disableInternalAuth: Whether local username/password login is disabled
Updating OIDC Settings
| Field | Type | Description |
|---|---|---|
enabled | boolean | Enable/disable OIDC authentication |
providerName | string | Provider display name (e.g., “Google”, “Okta”) |
issuerUrl | string | OIDC issuer URL (must be valid URL) |
clientId | string | OAuth 2.0 client ID |
clientSecret | string | OAuth 2.0 client secret |
clearClientSecret | boolean | Set to true to remove the stored secret |
disableInternalAuth | boolean | Disable local password authentication |
OIDC Configuration Steps
Configure Your Identity Provider
Set up an OAuth 2.0 / OIDC application in your identity provider (Google, Okta, Auth0, etc.).Configure the redirect URI to:
Obtain Credentials
Get the following from your identity provider:
- Issuer URL (discovery endpoint)
- Client ID
- Client Secret
Managing Client Secrets
Updating the Secret: Simply include the newclientSecret in your PATCH request:
The client secret is stored securely and never returned by the API. The
hasClientSecret boolean indicates whether one is configured.Disabling Internal Authentication
When you setdisableInternalAuth: true:
- Local username/password login is disabled
- Users can only authenticate via OIDC
- Admin users may still have fallback access (check your deployment configuration)
Authentication Method Indicators
When listing users, the API indicates how each user authenticated:"local": User registered with email/password"oidc": User authenticated via OIDC provider
oidcSubject field (server/src/admin/admin.service.ts:82).
Configuration Examples
Open Public Instance
Private Organization (OIDC Only)
Moderated Community
Hybrid Authentication
Security Recommendations
Use HTTPS
Always run Anchor over HTTPS, especially when using OIDC or collecting passwords
Secure Client Secrets
Store OIDC client secrets securely and rotate them periodically
Review Pending Users
Regularly check and process pending registrations in review mode
Test Before Disabling
Thoroughly test OIDC before disabling internal authentication
Next Steps
User Approval
Learn how to manage pending user registrations
Admin Panel
Explore all admin panel capabilities