This page gives you guidance on using the MIRACL Trust SSO Docker image. To get the miracl/sso docker image that is referenced in the following section, please contact MIRACL.

These instructions assume that you already followed the Installation / Quick Start instructions and learned how to successfully configure your SSO with a Service Provider.

Environment Variables

The following environment variables are available:

MIRACLSSO_CONFIG - sets the configuration to start the service with.

MIRACLSSO_CONFIGPATH - sets the path to the configuration file to start the service with.


MIRACLSSO_DUMP - if set to JSON or YAML, outputs the full configuration, if set to SCHEMA - outputs the JSON schema.

Docker quick guide

What follows is a quick step-by-step guide to getting a test Docker container running, which should give you an understanding of the necessary components and what command line options need to be passed in order to run the MIRACL Trust SSO docker image.

Assuming that you have your config files stored in a local directory such as /home/user/miracl-sso-test/ (as explained in the Installation / Quick Start instructions) you can now run:

docker run --name=sso --network host -v /home/user/miracl-sso-test/:/etc/miracl-sso miracl/sso:latest -p /etc/miracl-sso/config.yaml

As it is running on the host network (set by the option –network host), the service will be accessible at port 8000, unless you have changed the default port in the config. If you want to share only the used port to the SSO docker container instead of the whole host network, you could do it by the option -p 8000:8000:

docker run --name=sso -p 8000:8000 -v /home/user/miracl-sso-test/:/etc/miracl-sso miracl/sso:latest -p /etc/miracl-sso/config.yaml

If you want to use the environment variables to pass the SSO configuration, there are two options:

  • Use MIRACLSSO_CONFIGPATH to pass the path to the SSO configuration:
export MIRACLSSO_CONFIGPATH=`/home/user/miracl-sso-test/config.yaml`
docker run --name=sso --network host -it --rm -e MIRACLSSO_CONFIGPATH miracl/sso:latest
  • Use MIRACLSSO_CONFIG to pass the whole SSO configuration (to run it in CloudRun for example) - export the configuration in the MIRACLSSO_CONFIG and then pass it to the SSO container:
export MIRACLSSO_CONFIG=`cat /home/user/miracl-sso-test/config.yaml`
docker run --name=sso --network host -it --rm -v $(pwd):/sso -e MIRACLSSO_CONFIG miracl/sso:latest

No matter how you run your SSO service, you should be able to access and test your running service at

Running SSO with external memory storage

By default MIRACL Trust SSO service works with internal session storage and doesn’t have any dependencies but if you want to use Redis as an external session storage, you could run it on your host machine by:

sudo apt update && sudo apt install redis-server

sudo service redis-server start

SSO service will access the Redis server on port 6379 if setup to be used (see session storage) so make sure that this port is shared to the SSO docker container (either by explicit port sharing or the whole host network).

Running Docker with Consul for config management

The steps below make use of a local config.yaml file to run a Docker container which references a set of config files stored in Consul. The local config.yaml has only one include which points to the Consul config url, while Consul stores config files just as described in the Overview and Installation / Quick Start instructions.

Run consul in a docker container:

docker run -d --name=consul -p 8300:8300 -p 8500:8500 gliderlabs/consul-server -bootstrap -advertise=

Note that you should either share the Consul ports or use the option –net=host that means that it is connected to your host network and so will be accessible to the miracl-sso docker container.

Then visit and set up the necessary config files in key/value, including config.yaml to list the includes, core.yaml to store the server details, client id and secret; plus server certificates. As well as the relevant Service Provider config in the service_providers sub-folder:


Create local file /home/user/miracl-sso-consul/config.yaml that contains the correct consul url as an include:


Note that ?raw needs to be specified to access the contents of the file stored on consul.

Then run the miracl-sso container, assuming that you have your config file stored in a local directory such as /home/user/miracl-sso-consul/. Use either host network sharing:

docker run --network host -v /home/user/miracl-sso-consul/config.yaml:/etc/config.yaml miracl/sso:latest -p /etc/config.yaml

or specific ports sharing (8000 for the SSO and 8500 for Consul):

docker run -p 8000:8000 -p 8500:8500 -v /home/user/miracl-sso-consul/config.yaml:/etc/config.yaml miracl/sso:latest -p /etc/config.yaml

Notes on Docker usage

Setting log level

If the log parameter is included in any of your config files and the network parameter is set to ‘local’, for example:

  level: ERROR
  network: local

then the running Docker container attempts to connect to the local machine’s syslog.

You can connect to the local machine’s syslog either by setting the above network parameter and following with a command such as:

docker run --name=sso --network host -v /run/systemd/journal/syslog:/dev/log -v /home/user/miracl-sso-dockertest/:/etc/miracl-sso miracl/sso:latest -p /etc/miracl-sso/config.yaml

Or you can use the docker syslog driver. For this you do not need to supply the network parameter as it is managed entirely by docker e.g.:

docker run --name=sso --network host --log-driver=syslog --log-opt syslog-address=unixgram:///run/systemd/journal/syslog -v /home/user/miracl-sso-dockertest/config.yaml:/etc/config.yaml miracl/so:latest -p /etc/config.yaml

More information on Docker syslog settings can be found at