Skip to main content
In Admin > Settings > General, manage system-wide defaults — authentication policy, usage limits, feature toggles, etc.
General settings tab

Authentication Settings

Set policies for user signup and sessions.
SettingDescriptionDefault
Default user roleDefault role assigned to new users (pending, user, admin, or a specific group)pending
Enable new sign-upsWhether new users can self-registerEnabled
Enable onboardingWhether to show the onboarding landing page (service intro) to non-signed-in visitors. Disabling sends them straight to the sign-in screenEnabled
Show admin infoShow admin contact for users in pending stateDisabled
Enable API keysAllow authentication via API keysDisabled
Restrict API key endpointsRestrict the endpoints accessible via API keys (shown when API keys enabled)Disabled
Allowed endpointsList of paths accessible via API keys (comma-separated)-
JWT expirationSession token validity duration-1
JWT expiration format: 30m (minutes), 1h (hours), 10d (days), 1w (weeks), -1 (no expiration). In enterprise environments, 8h to 1d is recommended.

Email De-identification

When the ENABLE_EMAIL_DEIDENTIFY=true environment variable is set, the @ domain part is removed from user email addresses, storing only the ID portion.
ItemDisabled (default)Enabled
Sign-in/up label”Email""Account ID”
Input fieldtype="email"type="text"
Email validation@ requiredNo format restriction (allows employee IDs, etc.)
Stored valuesykim@cloocus.comsykim
Use this when privacy protection requirements dictate not storing full email addresses in DB in SSO/LDAP environments. Same applies to OAuth sign-in users.

LDAP Settings

Integrate with corporate LDAP / Active Directory servers for unified authentication.
SettingDescriptionExample
LabelLDAP server identifier nameCorporate AD
HostLDAP server addressldap.example.com
PortConnection port (default 636 with TLS)389
Application DNBind account DNcn=admin,dc=example,dc=com
Application DN PasswordBind account password-
Attribute for MailLDAP attribute mapped to emailmail
Attribute for UsernameLDAP attribute mapped to usernameuid, sAMAccountName
Search BaseUser search baseou=users,dc=example,dc=com
Search FiltersLDAP search filter (optional)(&(objectClass=inetOrgPerson)(uid=%s))
TLSUse TLS encryptionDisabled
LDAP settings apply immediately. Misconfiguration can block user sign-ins, so verify with a test account first.

Usage Limits

Set daily token usage caps to manage AI usage cost.
SettingDescriptionDefault
Enable usage limitsToken usage limit feature ON/OFFDisabled
Default daily token limitDefault applied to users without individual limits (0 = unlimited)0
Excess actionBehavior when limit is exceededWarn
Excess action options:
ActionDescription
WarnShow warning message but allow usage (monitoring purpose)
BlockBlock additional requests (returns HTTP 429)
Admin role users are excluded from usage limit checks. Usage limits can be set at 4 levels — global, user, group, organization — and the most permissive (highest) value applies.

Feature Toggles

Control whether specific features are enabled system-wide.
FeatureDescriptionDefault
Community SharingOpenWebUI community sharing featureDisabled
Message RatingUser AI response rating (like/dislike)Enabled
Channels (Beta)Team chat channel featureDisabled
User WebhooksPer-user external webhook integrationEnabled
Additionally, configure WebUI URL and Webhook URL.
SettingDescription
WebUI URLPublic URL used to generate notification links
Webhook URLExternal webhook URL invoked on events
Yes. Even with LDAP enabled, you can sign in with existing local accounts (email/password). When an LDAP user signs in for the first time, an account is auto-created. The default role is the Default user role under “Authentication Settings”.
Limits can be set at 4 levels — global, user, group, organization — and the most permissive (highest) value applies. For example, if global is 1,000 tokens and group is 5,000 tokens, users in that group can use up to 5,000 tokens.