🔐 Authentication & Authorization
LocalAI supports two authentication modes: legacy API key authentication (simple shared keys) and a full user authentication system with roles, sessions, OAuth, and per-user usage tracking.
Legacy API Key Authentication
The simplest way to protect your LocalAI instance is with API keys. Set one or more keys via environment variable or CLI flag:
Clients provide the key via any of these methods:
Authorization: Bearer <key>headerx-api-key: <key>headerxi-api-key: <key>headertokencookie
Legacy API keys grant full admin access — there is no role separation. For multi-user deployments with role-based access, use the user authentication system instead.
API keys can also be managed at runtime through the Runtime Settings interface.
User Authentication System
The user authentication system provides:
- User accounts with email, name, and avatar
- Role-based access control (admin vs. user)
- Session-based authentication with secure cookies
- OAuth login (GitHub) and OIDC single sign-on (Keycloak, Google, Okta, Authentik, etc.)
- Per-user API keys for programmatic access
- Admin route gating — management endpoints are restricted to admins
- Per-user usage tracking with token consumption metrics
Enabling Authentication
Set LOCALAI_AUTH=true or provide a GitHub OAuth Client ID or OIDC Client ID (which auto-enables auth):
Configuration Reference
| Environment Variable | Default | Description |
|---|---|---|
LOCALAI_AUTH | false | Enable user authentication and authorization |
LOCALAI_AUTH_DATABASE_URL | {DataPath}/database.db | Database URL — postgres://... for PostgreSQL, or a file path for SQLite |
GITHUB_CLIENT_ID | GitHub OAuth App Client ID (auto-enables auth when set) | |
GITHUB_CLIENT_SECRET | GitHub OAuth App Client Secret | |
LOCALAI_OIDC_ISSUER | OIDC issuer URL for auto-discovery (e.g. https://accounts.google.com) | |
LOCALAI_OIDC_CLIENT_ID | OIDC Client ID (auto-enables auth when set) | |
LOCALAI_OIDC_CLIENT_SECRET | OIDC Client Secret | |
LOCALAI_BASE_URL | Base URL for OAuth callbacks (e.g. http://localhost:8080) | |
LOCALAI_ADMIN_EMAIL | Email address to auto-promote to admin role on login | |
LOCALAI_REGISTRATION_MODE | approval | Registration mode: open, approval, or invite |
LOCALAI_DISABLE_LOCAL_AUTH | false | Disable local email/password registration and login (for OAuth/OIDC-only deployments) |
Disabling Local Authentication
If you want to enforce OAuth/OIDC-only login and prevent users from registering or logging in with email/password, set LOCALAI_DISABLE_LOCAL_AUTH=true (or pass --disable-local-auth):
When disabled:
- The login page will not show email/password forms (the UI checks the
providerslist from/api/auth/status) POST /api/auth/registerreturns403 ForbiddenPOST /api/auth/loginreturns403 Forbidden- OAuth/OIDC login continues to work normally
Roles
There are two roles:
- Admin: Full access to all endpoints, including model management, backend configuration, system settings, traces, agents, and user management.
- User: Access to inference endpoints only — chat completions, embeddings, image/video/audio generation, TTS, MCP chat, and their own usage statistics.
The first user to sign in is automatically assigned the admin role. Additional users can be promoted to admin via the admin user management API or by setting LOCALAI_ADMIN_EMAIL to their email address.
Registration Modes
| Mode | Description |
|---|---|
open | Anyone can register and is immediately active |
approval | New users land in “pending” status until an admin approves them. If a valid invite code is provided during registration, the user is activated immediately (skipping the approval wait). (default) |
invite | Registration requires a valid invite link generated by an admin. Without one, registration is rejected. |
Invite Links
Admins can generate single-use, time-limited invite links from the Users → Invites tab in the web UI, or via the API:
Share the invite URL (/invite/<code>) with the user. When they open it, the registration form is pre-filled with the invite code. Invite codes are single-use — once consumed, they cannot be reused. Expired or used invites are rejected.
For GitHub OAuth, the invite code is passed as a query parameter to the login URL (/api/auth/github/login?invite_code=<code>) and stored in a cookie during the OAuth flow.
Admin-Only Endpoints
When authentication is enabled, the following endpoints require admin role:
Model & Backend Management:
GET /api/models,POST /api/models/install/*,POST /api/models/delete/*GET /api/backends,POST /api/backends/install/*,POST /api/backends/delete/*GET /api/operations,POST /api/operations/*/cancelGET /models/available,GET /models/galleries,GET /models/jobs/*GET /backends,GET /backends/available,GET /backends/galleries
System & Monitoring:
GET /api/traces,POST /api/traces/clearGET /api/backend-traces,POST /api/backend-traces/clearGET /api/backend-logs/*,POST /api/backend-logs/*/clearGET /api/resources,GET /api/settings,POST /api/settingsGET /system,GET /backend/monitor,POST /backend/shutdown
P2P:
GET /api/p2p/*
Agents & Jobs:
- All
/api/agents/*endpoints - All
/api/agent/tasks/*and/api/agent/jobs/*endpoints
User-Accessible Endpoints (all authenticated users):
POST /v1/chat/completions,POST /v1/embeddings,POST /v1/completionsPOST /v1/images/generations,POST /v1/audio/*,POST /tts,POST /vad,POST /videoGET /v1/models,POST /v1/tokenize,POST /v1/detectionPOST /v1/mcp/chat/completions,POST /v1/messages,POST /v1/responsesPOST /stores/*,GET /api/cors-proxyGET /version,GET /api/features,GET /swagger/*,GET /metricsGET /api/auth/usage(own usage data)
Web UI Access Control
When auth is enabled, the React UI sidebar dynamically shows/hides sections based on the user’s role:
- All users see: Home, Chat, Images, Video, TTS, Sound, Talk, Usage, API docs link
- Admins also see: Install Models, Agents section (Agents, Skills, Memory, MCP CI Jobs), System section (Backends, Traces, Swarm, System, Settings)
Admin-only pages are also protected at the router level — navigating directly to an admin URL redirects non-admin users to the home page.
GitHub OAuth Setup
- Create a GitHub OAuth App at Settings → Developer settings → OAuth Apps → New OAuth App
- Set the Authorization callback URL to
{LOCALAI_BASE_URL}/api/auth/github/callback - Set
GITHUB_CLIENT_IDandGITHUB_CLIENT_SECRETenvironment variables - Set
LOCALAI_BASE_URLto your publicly-accessible URL
OIDC Setup
Any OIDC-compliant identity provider can be used for single sign-on. This includes Keycloak, Google, Okta, Authentik, Azure AD, and many others.
Steps:
- Create a client/application in your OIDC provider
- Set the redirect URL to
{LOCALAI_BASE_URL}/api/auth/oidc/callback - Set the three environment variables:
LOCALAI_OIDC_ISSUER,LOCALAI_OIDC_CLIENT_ID,LOCALAI_OIDC_CLIENT_SECRET
LocalAI uses OIDC auto-discovery (the /.well-known/openid-configuration endpoint) and requests the standard scopes: openid, profile, email.
Provider examples:
For OIDC, invite codes work the same way as GitHub OAuth — the invite code is passed as a query parameter to the login URL (/api/auth/oidc/login?invite_code=<code>) and stored in a cookie during the OAuth flow.
User API Keys
Authenticated users can create personal API keys for programmatic access:
User API keys inherit the creating user’s role. Admin keys grant admin access; user keys grant user-level access.
Auth API Endpoints
| Method | Endpoint | Description | Auth Required |
|---|---|---|---|
GET | /api/auth/status | Auth state, current user, providers | No |
POST | /api/auth/logout | End session | Yes |
GET | /api/auth/me | Current user info | Yes |
POST | /api/auth/api-keys | Create API key | Yes |
GET | /api/auth/api-keys | List user’s API keys | Yes |
DELETE | /api/auth/api-keys/:id | Revoke API key | Yes |
GET | /api/auth/usage | User’s own usage stats | Yes |
GET | /api/auth/admin/users | List all users | Admin |
PUT | /api/auth/admin/users/:id/role | Change user role | Admin |
DELETE | /api/auth/admin/users/:id | Delete user | Admin |
GET | /api/auth/admin/usage | All users’ usage stats | Admin |
POST | /api/auth/admin/invites | Create invite link | Admin |
GET | /api/auth/admin/invites | List all invites | Admin |
DELETE | /api/auth/admin/invites/:id | Revoke unused invite | Admin |
GET | /api/auth/invite/:code/check | Check if invite code is valid | No |
GET | /api/auth/github/login | Start GitHub OAuth | No |
GET | /api/auth/github/callback | GitHub OAuth callback (internal) | No |
GET | /api/auth/oidc/login | Start OIDC login | No |
GET | /api/auth/oidc/callback | OIDC callback (internal) | No |
Usage Tracking
When authentication is enabled, LocalAI automatically tracks per-user token usage for inference endpoints. Usage data includes:
- Prompt tokens, completion tokens, and total tokens per request
- Model used and endpoint called
- Request duration
- Timestamp for time-series aggregation
Viewing Usage
Usage is accessible through the Usage page in the web UI (visible to all authenticated users) or via the API:
Period values:
day— last 24 hours, bucketed by hourweek— last 7 days, bucketed by daymonth— last 30 days, bucketed by day (default)all— all time, bucketed by month
Response format:
Usage Dashboard
The web UI Usage page provides:
- Period selector — switch between day, week, month, and all-time views
- Summary cards — total requests, prompt tokens, completion tokens, total tokens
- By Model table — per-model breakdown with visual usage bars
- By User table (admin only) — per-user breakdown across all models
Combining Auth Modes
Legacy API keys and user authentication can be used simultaneously. When both are configured:
- User sessions and user API keys are checked first
- Legacy API keys are checked as fallback — they grant admin-level access
- This allows a gradual migration from shared API keys to per-user accounts
Build Requirements
The user authentication system requires CGO for SQLite support. It is enabled with the auth build tag, which is included by default in Docker builds.
The default Dockerfile includes GO_TAGS="auth", so all Docker images ship with auth support. When building from source without the auth tag, setting LOCALAI_AUTH=true has no effect — the system operates without authentication.