Login V2 not working with virtual instance?
ZITADEL_SYSTEMAPIUSERS
env var.
The default instance works fine. I can go to localhost:8080
and it'll redirect me to :3000
for the login v2 ui, which allows me to login just fine....Issue linking existing user with SAML IdP (External User Not Found)
First test-deployment using nomad: cannot login (using loginv2)
.pat
file's contents to vault
, and render them back to ZITADEL_SERVICE_USER_TOKEN_FILE=/local/login-client.vault.pat
for both the login and main container. When I try to login, I get in the main container:
```
2025-08-27T16:32:07.518788054+02:00 stderr F time="2025-08-27T14:32:07Z" level=info msg="server is listening on [::]:8080" caller="/home/runner/work/zitadel/zitadel/cmd/start/start.go:677"
,2025-08-27T16:32:54.628370448+02:00 stderr F time="2025-08-27T14:32:54Z" level=warning msg="token verifier repo: decrypt access token" caller="/home/runner/work/zitadel/zitadel/internal/authz/repository/eventsourcing/eventstore/token_verifier.go:282" error="ID=APP-8EF0zZ Message=invalid token"
2025-08-27T16:32:54.628370448+02:00 stderr F time="2025-08-27T14:32:54Z" level=warning msg="token verifier repo: verify JWT access token" caller="/home/runner/work/zitadel/zitadel/internal/authz/repository/eventsourcing/eventstore/token_verifier.go:286" error="parsing of request failed: token contains an invalid number of segments"...ClientID has no @ symbol

MCP DCR support
Bigger picture - SCIM between Entra ID and Zitadel
Default role during account creation without v2 actions.
Available authentication flows?
We have configured Google and MS as external IDP, but these buttons do now show up at login

Integrating ZITADEL in a mobile app, UX issue
FaceID (2FA) stopped working after ExternalDomain change?
failed to validate certificate from request: %!w(<nil>)
Web console shows Organization Metadata values with incorrect encoding in Zitadel v3.x.x

Intended beaviour of livenessProbe
Multiple bugs with Microsoft IdP

Login as an existing user to reproduce API bugs
Federated login using Microsoft Entra ID as IdP, but only for pre-approved customers?
Adding userGrants in Post Creation trigger (external auth flow) fails for Entra
Seeding new zitadel instances