diff --git a/flux2/core/base/single-sign-on/single-sign-on-values-configmap.yaml b/flux2/core/base/single-sign-on/single-sign-on-values-configmap.yaml
index 682841595af6cbf9a333390805333816f290bacc..19da0eff5cc843288bfff5528e7304f7aff301a0 100644
--- a/flux2/core/base/single-sign-on/single-sign-on-values-configmap.yaml
+++ b/flux2/core/base/single-sign-on/single-sign-on-values-configmap.yaml
@@ -7,40 +7,6 @@ data:
   values.yaml: |
     singleSignOnHost: &SSO_HOST "sso.${domain}"
 
-    userpanel:
-      applicationName: &USER_PANEL user-panel
-      ingress:
-        host: "admin.${domain}"
-
-    userbackend:
-      applications:
-        - name: *USER_PANEL
-          description: Administration interface to manage user accounts
-        - name: &NEXTCLOUD nextcloud
-          description: "Nextcloud Files offers an on-premise Universal File Access and sync platform with powerful collaboration capabilities and desktop, mobile and web interfaces."
-        - name: &WORDPRESS wordpress
-          description: "WordPress website hosting."
-        - name: &GRAFANA grafana
-          description: "Grafana allows you to query, visualize, alert on and understand metrics generated by Stackspin. It can be used to create explore and share dashboards."
-        - name: &WEKAN wekan
-          description: "Wekan Kanban board."
-        - name: &ZULIP zulip
-          description: "Communicate and collaborate using team chat and switch to video or audio calls with screen sharing for more efficient teamwork."
-        - name: &DASHBOARD dashboard
-          description: "Stackspin dashboard."
-      username: "${userbackend_admin_username}"
-      password: "${userbackend_admin_password}"
-      email: "${admin_email}"
-      postgres:
-        password: "${userbackend_postgres_password}"
-      persistence:
-        enabled: true
-        size: 1Gi
-        existingClaim: single-sign-on-userbackend
-      podAnnotations:
-        # Let the backup system include nextcloud database data.
-        backup.velero.io/backup-volumes: "database"
-
     postgresql:
       persistence:
         existingClaim: single-sign-on-database
@@ -87,6 +53,16 @@ data:
       kratos:
         config:
           dsn: "postgres://kratos:${kratos_postgresql_password}@single-sign-on-postgresql:5432/kratos"
+        selfservice:
+          flows:
+            recovery:
+              ui_url: https://sso.${domain}/login/recovery
+            login:
+              ui_url: https://sso.${domain}/login/login
+            settings:
+              ui_url: https://sso.${domain}/login/settings
+            registration:
+              ui_url: https://sso.${domain}/login/registration
 
     oAuthClients:
     - clientName: *USER_PANEL
diff --git a/flux2/core/base/sources/single-sign-on.yaml b/flux2/core/base/sources/single-sign-on.yaml
index 4faf6956c6885e4795c1be458236e6512c4b1c21..c230579c49707edf31ece8aa36fc01a81576af48 100644
--- a/flux2/core/base/sources/single-sign-on.yaml
+++ b/flux2/core/base/sources/single-sign-on.yaml
@@ -14,4 +14,5 @@ spec:
   # For all available options, see:
   # https://toolkit.fluxcd.io/components/source/api/#source.toolkit.fluxcd.io/v1beta1.GitRepositoryRef
   ref:
-    tag: 0.4.3
+    # tag: 0.4.3
+    branch: loginpanel