diff --git a/website/integrations/services/open-webui/index.md b/website/integrations/services/open-webui/index.md
new file mode 100644
index 000000000000..b2b7e5ca681f
--- /dev/null
+++ b/website/integrations/services/open-webui/index.md
@@ -0,0 +1,61 @@
+---
+title: Integrate with Open WebUI
+sidebar_label: Open WebUI
+---
+
+# Integrate with Open WebUI
+
+Support level: Community
+
+## What is Open WebUI
+
+> Open WebUI is a simple, self-hosted AI platform that works entirely offline. It supports tools like Ollama and OpenAI-style APIs and has a built-in engine for RAG tasks.
+>
+> -- https://openwebui.com/
+
+## Preparation
+
+The following placeholders are used in this guide:
+
+- `openwebui.company` is the FQDN of the Open WebUI installation.
+- `authentik.company` is the FQDN of the authentik installation.
+
+:::note
+This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application.
+:::
+
+## authentik configuration
+
+[Create](https://docs.goauthentik.io/docs/add-secure-apps/applications/manage_apps#add-new-applications) an OAuth2/OpenID provider and an application in authentik using the wizard.
+
+Provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations.
+
+- Note the **Client ID**, **Client Secret**, and **slug** values for later use.
+- Set the redirect URI to https://openwebui.company/oauth/oidc/callback.
+- Select any available signing key.
+
+## Open WebUI configuration
+
+You need to set the environment variables in the appropriate place based on your deployment method—either in the .env file or as Docker environment variables. The values themselves remain the same, only their location differs.
+
+Enter the following details from the authentik provider:
+
+- Set **OAUTH_CLIENT_ID** to the Client ID copied from authentik.
+- Set **OAUTH_CLIENT_SECRET** to the Client Secret copied from authentik.
+- Set **OAUTH_PROVIDER_NAME** to `authentik`.
+- Set **OPENID_PROVIDER_URL** to https://authentik.company/o/slug/.well-known/openid-configuration.
+
+## Configuration verification
+
+- Open your web browser and go to https://openwebui.company.
+- Make sure you are logged off any previous session.
+- Click **Continue with authentik** to log in.
+- After logging in, authentik will redirect you back to https://openwebui.company.
+- If you successfully return to the Open WebUI, the login is working correctly.
+
+:::note
+Users are automatically created, but an administrator must update their role to at least **User** via the WebGUI.
+To do so, log in as an administrator and access the **Admin Panel** (URL: https://openwebui.company/admin/users).
+Click on the user whose role should be increased from **Pending** to at least **User**.
+More details on how to administer Open WebUI can be found here https://docs.openwebui.com/.
+:::
diff --git a/website/sidebarsIntegrations.js b/website/sidebarsIntegrations.js
index cd1637da15a1..16df957bfb82 100644
--- a/website/sidebarsIntegrations.js
+++ b/website/sidebarsIntegrations.js
@@ -133,6 +133,7 @@ module.exports = {
"services/jellyfin/index",
"services/komga/index",
"services/node-red/index",
+ "services/open-webui/index",
"services/semaphore/index",
"services/sonar-qube/index",
"services/sonarr/index",