Add SAML/OIDC SSO to n8n — Protect Workflow Automation and API Credentials
Why n8n Needs an Authenticated Proxy
n8n is a popular workflow automation platform that connects APIs, services, and databases into automated workflows. Self-hosted n8n instances store API keys, OAuth tokens, database credentials, and webhook configurations for dozens of connected services. A compromised n8n instance gives attackers access to every integrated service — Slack, GitHub, databases, CRMs, payment processors, and more. The workflow editor also enables arbitrary code execution via the Code node. OnePAM adds enterprise SSO by placing an authenticated reverse proxy in front of n8n. Users authenticate through your corporate IdP, and only verified users can access workflow automation, credentials, and execution history.
n8n can be configured behind a trusted reverse proxy that provides the authenticated user identity via HTTP headers. OnePAM injects the verified identity, and n8n creates the session accordingly.
n8n Vulnerability Risks
Without an authenticated proxy, these risks are directly exploitable by any network-reachable attacker.
Security Challenges with n8n
These are the risks organizations face when n8n is not behind an authenticated proxy.
Multi-Service Credential Store
n8n stores API keys, OAuth tokens, and database passwords for every connected service. One compromise exposes credentials for dozens of platforms.
Arbitrary Code Execution
The Code node enables JavaScript execution on the n8n server, allowing arbitrary command execution if access is unauthorized.
Webhook Exposure
n8n webhook URLs are publicly accessible by default, allowing external triggering of workflows that may have privileged access.
Execution Data Sensitivity
Workflow execution history contains data processed from connected services, which may include PII, financial data, or credentials.
SSO Licensing
n8n's built-in SSO (SAML, LDAP) requires the Enterprise plan. Self-hosted community users have limited auth options.
Broad Integration Access
A single n8n instance connects to email, CRM, databases, cloud services, and internal APIs — maximizing the blast radius of a compromise.
How OnePAM Adds SSO + Zero-Day Protection to n8n
A step-by-step guide to deploying OnePAM's authenticated proxy in front of n8n.
Deploy OnePAM as n8n's Gateway
Place OnePAM in front of n8n, intercepting all web and webhook traffic.
Configure Your IdP
Connect OnePAM to your SAML 2.0 or OIDC identity provider.
Enable Proxy Authentication
OnePAM injects the authenticated identity via HTTP headers that n8n trusts.
Secure Credentials and Webhooks
Control who can view credentials, edit workflows, and configure webhook endpoints.
Audit Automation Activity
Every workflow edit, execution, and credential access is logged with corporate identity.
Benefits of Securing n8n with OnePAM
Measurable security and operational outcomes from deploying OnePAM in front of n8n.
Protect Integration Credentials
API keys and OAuth tokens for all connected services are behind identity-verified access.
All credentials protectedSSO for n8n Community
OnePAM provides enterprise SSO for self-hosted n8n without requiring the Enterprise plan.
Enterprise SSO for free n8nBlock Code Execution Abuse
Only authenticated users can access the workflow editor and Code nodes.
Unauthorized execution blockedSecure Webhook Endpoints
Webhook URLs can be protected with authentication policies separate from the main UI.
Webhooks identity-gatedMFA for Automation
Require MFA before editing workflows or accessing credentials.
MFA-protected automationComplete Automation Audit
Every workflow change and execution is logged with corporate identity.
Full audit trailn8n SSO Capabilities
Every feature needed to provide enterprise-grade SSO and access control for n8n.
Zero-Day Protection Features
Enterprise-grade security controls that shield n8n from exploitation.
n8n SSO + Security Use Cases
Common scenarios where organizations deploy OnePAM in front of n8n.
n8n SSO + Security FAQ
Common questions about deploying OnePAM's authenticated proxy for n8n.
Does OnePAM work with self-hosted n8n community edition?
Can we protect n8n webhook endpoints?
Does OnePAM affect n8n's internal workflow execution?
Can we restrict who can use Code nodes?
What about n8n's built-in user management?
Ready to Secure n8n with SSO + Zero-Day Protection?
Deploy OnePAM in minutes — no n8n code changes required. Start your free 14-day trial today.