IoT & Workflow Automation
X-Forwarded-User
Zero-Day Shield

SSO + Zero-Day Protection for Node-RED

by OpenJS Foundation

Add SAML/OIDC SSO to Node-RED — Secure Your Flow-Based Automation Platform

Why Node-RED Needs an Authenticated Proxy

Node-RED is a flow-based development tool for visual programming of IoT devices, API integrations, and automation workflows. Node-RED flows can control industrial equipment, process sensor data, trigger business workflows, and integrate with external APIs. A compromised Node-RED instance gives attackers control over automated processes, access to API credentials, and potential control of connected IoT devices. OnePAM adds enterprise SSO to Node-RED, ensuring only authorized automation engineers can design and deploy flows.

HTTP Header Authentication
X-Forwarded-User

Node-RED supports httpNodeAuth and adminAuth with custom authentication modules. OnePAM injects the authenticated user identity via HTTP headers, which Node-RED's proxy auth module trusts.

Node-RED Vulnerability Risks

Without an authenticated proxy, these risks are directly exploitable by any network-reachable attacker.

Node-RED flows can execute arbitrary JavaScript and system commands
API credentials and tokens stored in flows are visible in the editor
IoT device controls accessible through flow endpoints can affect physical systems
Function nodes can read the filesystem and make network requests

Security Challenges with Node-RED

These are the risks organizations face when Node-RED is not behind an authenticated proxy.

Arbitrary Code Execution

Node-RED function nodes execute JavaScript on the server. Custom nodes can run system commands and access the filesystem.

API Credential Exposure

Flows contain API keys, OAuth tokens, database credentials, and MQTT broker credentials in node configurations.

IoT Device Control

Node-RED flows may control industrial equipment, building systems, or IoT devices — unauthorized changes can have physical consequences.

Basic Authentication

Node-RED's default authentication is a static username/password. Enterprise SSO requires custom authentication modules.

Flow Tampering

Unauthorized users could modify automation flows to disrupt processes or exfiltrate data.

No Session Auditing

Node-RED does not provide session recording or detailed audit logging of editor activity.

How OnePAM Adds SSO + Zero-Day Protection to Node-RED

A step-by-step guide to deploying OnePAM's authenticated proxy in front of Node-RED.

1

Deploy OnePAM as Node-RED Proxy

Place OnePAM in front of the Node-RED editor and dashboard.

Node-RED is configured to accept connections only from OnePAM. Direct access is blocked.
2

Configure Your Identity Provider

Connect OnePAM to your SAML/OIDC provider.

Automation engineers authenticate via corporate SSO with MFA before accessing the flow editor.
3

Enable Proxy Authentication

Node-RED trusts the authenticated identity from OnePAM's headers.

Individual users are identified for accountability. No shared passwords.
4

Separate Editor and Dashboard Access

Different access levels for flow editor vs. read-only dashboard.

Engineers can edit flows; operators can view dashboards; external users get specific HTTP endpoints.
5

Audit Flow Changes

Every editor session and flow deployment is logged with corporate identity.

Track who modified which flows, when deployments happened, and what changed.

Benefits of Securing Node-RED with OnePAM

Measurable security and operational outcomes from deploying OnePAM in front of Node-RED.

Protect Automation Flows

Only authorized engineers can access the flow editor and modify automation logic.

Zero unauthorized flow access

Enterprise SSO for Node-RED

Replace static passwords with corporate SSO. Individual accountability for every flow change.

Corporate SSO for automation

Secure API Credentials

API keys and tokens in flow configurations are protected behind enterprise authentication.

Credentials protected

IoT Safety

Prevent unauthorized modifications to flows controlling IoT devices and physical systems.

Physical system protection

MFA for Automation

Require MFA before accessing the flow editor or deploying changes.

MFA-protected flows

Deployment Audit Trail

Every flow deployment tracked with who, when, and what changed.

Complete deployment history

Node-RED SSO Capabilities

Every feature needed to provide enterprise-grade SSO and access control for Node-RED.

SAML 2.0 & OIDC SSO for Node-RED editor and dashboard
Separate access policies for editor vs dashboard
Flow deployment access control by IdP group
Session recording for compliance
IP and geo-restriction
Device trust verification
HTTP endpoint access policies
API credential access auditing
Multi-instance Node-RED SSO
Dashboard read-only access for operators

Zero-Day Protection Features

Enterprise-grade security controls that shield Node-RED from exploitation.

Node-RED isolated from direct network access
End-to-end TLS encryption
Request-level authentication
WebSocket authentication for editor sessions
Header injection prevention
Automatic session invalidation on IdP sign-out

Node-RED SSO + Security Use Cases

Common scenarios where organizations deploy OnePAM in front of Node-RED.

1
Automation engineers accessing Node-RED with corporate SSO and MFA
2
Restricting flow editor access while allowing dashboard viewing for operators
3
Securing IoT automation platforms in manufacturing environments
4
Auditing flow changes for change management compliance
5
Protecting API credentials stored in Node-RED flows
6
Providing time-limited Node-RED access for contractors

Node-RED SSO + Security FAQ

Common questions about deploying OnePAM's authenticated proxy for Node-RED.

Does OnePAM work with Node-RED's dashboard?

Yes. OnePAM can provide different access levels: editor access for engineers and read-only dashboard access for operators.

Can we protect Node-RED HTTP endpoints separately?

Yes. OnePAM policies can apply different authentication requirements to Node-RED's editor, dashboard, and HTTP-in endpoints.

Does OnePAM affect Node-RED's MQTT connections?

No. OnePAM protects the web interface. MQTT, TCP, and other protocol connections from Node-RED to external services are unaffected.

Does OnePAM support Node-RED in Docker?

Yes. OnePAM can proxy to Node-RED running in Docker, Kubernetes, or any other deployment method.

Can different teams have different Node-RED instances?

Yes. OnePAM can route authenticated users to different Node-RED instances based on IdP group membership.

Ready to Secure Node-RED with SSO + Zero-Day Protection?

Deploy OnePAM in minutes — no Node-RED code changes required. Start your free 14-day trial today.