The MatrixRTC Authorization Service bridges Matrix and LiveKit, handling authentication and room creation when needed.
Matrix user wants to start or join a call?
π€ β‘οΈ Gets OpenID token β‘οΈ Sends it to the MatrixRTC Authorization Service β‘οΈ Receives LiveKit JWT β‘οΈ
- If full-access user β‘οΈ Can trigger LiveKit room creation (if needed) β‘οΈ Joins the call π
- If restricted user β‘οΈ Can join existing rooms β‘οΈ Joins the call π
π‘ Once connected, the LiveKit SFU handles all real-time media routing so participants can see and hear each other.
This service is part of the MatrixRTC stack and is primarily used when the LiveKit RTC backend (MSC4195) is in use.
As outlined in the Element Call Self-Hosting Guide, youβll also need:
- A LiveKit SFU
- MatrixRTC-compatible clients such as
Element Call, which can run
either:
- As a standalone Single Page Application (SPA) or
- Embedded for in-app calling
π Generates JWT tokens for a given LiveKit identity and room derived from the Matrix user and Matrix room, allowing users to authenticate with the LiveKit SFU.
π‘οΈ Manages user access levels to ensure the proper and secure use of infrastructure:
- Full-access users β Matrix users from homeservers in the same or related deployment as the MatrixRTC backend. Can trigger automatic LiveKit room creation if needed.
- Restricted users β All other Matrix users. Can join existing LiveKit SFU rooms, but cannot auto-create new ones.
ποΈ Auto-creates LiveKit rooms for full-access users if they donβt already exist.
Note
This setup ensures resources are used appropriately while still supporting seamless cross-federation MatrixRTC sessions, e.g., video calls. Remote users (not on the same deployment) can join existing rooms, but only full-access (local) users can trigger room creation. The SFU selection algorithm and event ordering ensure that conferences across Matrix federation remain fully functional.
sequenceDiagram
participant U as π§ User
participant M as π’ Matrix Homeserver
participant A as π MatrixRTC Authorization Service
participant L as π‘ LiveKit SFU
U->>M: Requests OpenID token
M-->>U: Returns OpenID token
U->>A: Sends OpenID token & room request
A->>M: Validates token via OpenID API
M-->>A: Confirms user identity
A->>A: Generates LiveKit JWT
A->>L: (If full-access user) Create room if missing
A-->>U: Returns LiveKit JWT
U->>L: Connects to room using JWT
Releases are available here.
docker run -e LIVEKIT_URL="ws://somewhere" -e LIVEKIT_KEY=devkey -e LIVEKIT_SECRET=secret -e LIVEKIT_FULL_ACCESS_HOMESERVERS=example.com -p 8080:8080 ghcr.io/element-hq/lk-jwt-service:0.3.0
- Download & extract:
wget https://github.com/element-hq/lk-jwt-service/archive/refs/tags/v0.3.0.tar.gz
tar -xvf v0.3.0.tar.gz
mv lk-jwt-service-0.3.0 lk-jwt-service
- Build:
cd lk-jwt-service
go build -o lk-jwt-service .
- Run locally:
LIVEKIT_URL="ws://somewhere" LIVEKIT_KEY=devkey LIVEKIT_SECRET=secret LIVEKIT_LOCAL_HOMESERVERS=example.com ./lk-jwt-service
Set environment variables to configure the service:
Variable | Description | Required |
---|---|---|
LIVEKIT_URL |
WebSocket URL of the LiveKit SFU | β Yes |
LIVEKIT_KEY / LIVEKIT_KEY_FROM_FILE |
API key or file path for LiveKit SFU | β Yes |
LIVEKIT_SECRET / LIVEKIT_SECRET_FROM_FILE |
API secret or file path for LiveKit SFU | β Yes |
LIVEKIT_KEY_FILE |
File path with APIkey: secret format |
LIVEKIT_KEY and LIVEKIT_SECRET |
LIVEKIT_JWT_PORT |
Port to listen on (default: 8080 ) |
β No |
LIVEKIT_FULL_ACCESS_HOMESERVERS |
Comma-separated list of fully authorized homeservers (* for all) |
β Default: * |
Important
By default, the LiveKit SFU auto-creates rooms for all users. To ensure proper access control, update your LiveKit config.yaml to disable automatic room creation.
LiveKit SFU config should include:
room:
auto_create: false
To properly secure the MatrixRTC Authorization Service, a reverse proxy is recommended.
matrix-rtc.domain.tld {
bind xx.xx.xx.xx
handle /livekit/jwt* {
reverse_proxy localhost:8080
}
}
server {
listen 80;
server_name matrix-rtc.domain.tld;
# Redirect HTTP β HTTPS
return 301 https://$host$request_uri;
}
server {
listen 443 ssl;
server_name matrix-rtc.domain.tld;
# TLS certificate paths (replace with your own)
ssl_certificate /etc/ssl/certs/matrix-rtc.crt;
ssl_certificate_key /etc/ssl/private/matrix-rtc.key;
# TLS settings (minimal)
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers HIGH:!aNULL:!MD5;
location /livekit/jwt/ {
proxy_pass http://localhost:8080/;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
}
For proper MatrixRTC functionality, you need to configure your site's
.well-known/matrix/client
. See the
Element Call self-hosting guide
for reference.
The following key must be included in
https://domain.tld/.well-known/matrix/client
:
"org.matrix.msc4143.rtc_foci": [
{
"type": "livekit",
"livekit_service_url": "https://matrix-rtc.domain.tld/livekit/jwt"
}
]
For testing and debugging (e.g. in the absence of trusted certificates while
testing in a lab), you can disable TLS verification for the outgoing connection
to the Matrix homeserver by setting the environment variable
LIVEKIT_INSECURE_SKIP_VERIFY_TLS
to YES_I_KNOW_WHAT_I_AM_DOING
.
Based on the Element Call GitHub repo
The easiest way to spin up the full Matrix stack is by using the development environment provided by Element Call. For detailed instructions, see Element Call Backend Setup.
Note
To ensure your local frontend works properly, you need to add certificate exceptions in your browser for:
https://localhost:3000
https://matrix-rtc.m.localhost/livekit/jwt/healthz
https://synapse.m.localhost/.well-known/matrix/client
You can do this either by adding the minimal m.localhost CA (dev_tls_m.localhost.crt) to your browserβs trusted certificates, or by visiting each URL in your browser and following the prompts to accept the exception.
git clone https://github.com/element-hq/element-call.git
cd element-call
docker-compose -f ./dev-backend-docker-compose.yml -f ./playwright-backend-docker-compose.override.yml up nginx livekit synapse redis
git clone https://github.com/element-hq/lk-jwt-service
cd lk-jwt-service
LIVEKIT_INSECURE_SKIP_VERIFY_TLS="YES_I_KNOW_WHAT_I_AM_DOING" \
LIVEKIT_URL="wss://matrix-rtc.m.localhost/livekit/sfu" \
LIVEKIT_KEY=devkey \
LIVEKIT_SECRET=secret \
LIVEKIT_JWT_PORT=6080 \
LIVEKIT_LOCAL_HOMESERVERS=synapse.m.localhost \
./lk-jwt-service