Protect pages and forms with secure sign in backed by your identity provider. Users land on a login screen, then return with their profile so you can show a welcome page or continue to your app. Ideal for teams that need simple access control without building a full backend.
A webhook receives the request and stores key endpoints and client details in a variables node. A code node reads cookies to find any saved token. If the URL has a code and PKCE is off, the flow swaps the code for an access token using the token endpoint. When a token is present, an HTTP request pulls user details from the user info endpoint. An If check decides which HTML page to return. The login form builds the authorize URL. The welcome page shows the user email. Two response nodes send the right page back to the browser.
Setup needs an OpenID Connect provider such as Keycloak. Add your authorization, token, and user info endpoints, client id, scopes, and optional client secret and redirect URI. Expected result is a clean single sign on path that saves build time and avoids manual checks. Good for gating internal tools, admin panels, and quick demos where you need verified users before they interact with data.