Configure authentication for Open Agent Platform
apps/web/
directory:
NEXT_PUBLIC_GOOGLE_AUTH_DISABLED=true
in your environment variables to disable showing Google as an authentication option in the UI.
Authorization
header of the request.
Inside the auth middleware of the LangGraph server, we extract this token and verify it’s valid with Supabase. If it is, we receive back a user ID, which is used to verify each user is only able to access their own agents and threads. If you want to allow users access to agents they did not create, you should update the custom authentication middleware in the LangGraph server to allow access to the agents you want users to be able to access.
Along with the Authorization
header, we duplicate passing the Supabase JWT via the x-supabase-access-token
header. This is because all non-LangSmith specific headers which are sent to LangGraph servers which are prefixed with x-
are included in the configurable fields of the thread. We will need this JWT to later authenticate with the MCP server.
NEXT_PUBLIC_USE_LANGSMITH_AUTH
environment variable to true
, and setting your LANGSMITH_API_KEY
in the environment variables inside the apps/web/
directory.
Lastly, ensure you have the NEXT_PUBLIC_BASE_API_URL
environment variable set to the base API URL of your web server. For local development, this should be set to:
NEXT_PUBLIC_
, as this is a secret and should never be exposed to the client.Authorization
header of the request. Then, inside the LangConnect RAG server, we extract this token and verify it’s valid with Supabase.
If it is, we receive back a user ID, which is used to verify each user is only able to access their own collections. We do not currently support sharing collections between users.