diff --git a/api/v1alpha1/apigateway_types.go b/api/v1alpha1/apigateway_types.go
index 359a4a7..2bedf7c 100644
--- a/api/v1alpha1/apigateway_types.go
+++ b/api/v1alpha1/apigateway_types.go
@@ -204,6 +204,14 @@ func (s *DashboardEndpointSpec) OAuth2() *DashboardOAuth2Spec {
 	return s.Auth.OAuth2
 }
 
+func (s *DashboardEndpointSpec) Basic() *DashboardBasicAuthSpec {
+	if s == nil || s.Auth == nil {
+		return nil
+	}
+
+	return s.Auth.Basic
+}
+
 // APIGatewaySpec defines the desired state of APIGateway.
 type APIGatewaySpec struct {
 	// Envoy - configure the envoy instance and most importantly the control-plane
diff --git a/internal/webhook/v1alpha1/apigateway_webhook_validator.go b/internal/webhook/v1alpha1/apigateway_webhook_validator.go
index 77b9350..6c7a1a3 100644
--- a/internal/webhook/v1alpha1/apigateway_webhook_validator.go
+++ b/internal/webhook/v1alpha1/apigateway_webhook_validator.go
@@ -36,6 +36,8 @@ var apigatewaylog = logf.Log.WithName("apigateway-resource")
 var (
 	ErrMissingEnvoySpec        = errors.New("envoy needs to be configured")
 	ErrMissingControlPlaneSpec = errors.New("envoy control plane needs to be configured")
+	ErrOAuth2EndpointsMissing  = errors.New("oauth2 endpoints missing")
+	ErrBasicAuthNoUsers        = errors.New("no users configured for basic auth")
 )
 
 // +kubebuilder:webhook:path=/validate-supabase-k8s-icb4dc0-de-v1alpha1-apigateway,mutating=false,failurePolicy=fail,sideEffects=None,groups=supabase.k8s.icb4dc0.de,resources=apigateways,verbs=create;update,versions=v1alpha1,name=vapigateway-v1alpha1.kb.io,admissionReviewVersions=v1
@@ -57,7 +59,18 @@ func (v *APIGatewayCustomValidator) ValidateCreate(ctx context.Context, obj runt
 	}
 	apigatewaylog.Info("Validation for APIGateway upon creation", "name", apigateway.GetName())
 
-	return validateEnvoyControlPlane(apigateway)
+	warnings, err := validateEnvoyControlPlane(apigateway)
+	if err != nil {
+		return warnings, err
+	}
+
+	if warns, err := validateDashboardEndpointSpec(apigateway); err != nil {
+		return append(warnings, warns...), err
+	} else {
+		warnings = append(warnings, warns...)
+	}
+
+	return warnings, nil
 }
 
 // ValidateUpdate implements webhook.CustomValidator so a webhook will be registered for the type APIGateway.
@@ -68,7 +81,18 @@ func (v *APIGatewayCustomValidator) ValidateUpdate(ctx context.Context, oldObj,
 	}
 	apigatewaylog.Info("Validation for APIGateway upon update", "name", apigateway.GetName())
 
-	return validateEnvoyControlPlane(apigateway)
+	warnings, err := validateEnvoyControlPlane(apigateway)
+	if err != nil {
+		return warnings, err
+	}
+
+	if warns, err := validateDashboardEndpointSpec(apigateway); err != nil {
+		return append(warnings, warns...), err
+	} else {
+		warnings = append(warnings, warns...)
+	}
+
+	return warnings, nil
 }
 
 // ValidateDelete implements webhook.CustomValidator so a webhook will be registered for the type APIGateway.
@@ -95,3 +119,29 @@ func validateEnvoyControlPlane(gateway *supabasev1alpha1.APIGateway) (admission.
 
 	return nil, nil
 }
+
+func validateDashboardEndpointSpec(gateway *supabasev1alpha1.APIGateway) (warnings admission.Warnings, err error) {
+	dashboardEndpointSpec := gateway.Spec.DashboardEndpoint
+	if dashboardEndpointSpec == nil {
+		return nil, nil
+	}
+
+	switch dashboardEndpointSpec.AuthType() {
+	case supabasev1alpha1.DashboardAuthTypeOAuth2:
+		oauth2Spec := dashboardEndpointSpec.OAuth2()
+		if oauth2Spec.OpenIDIssuer == "" && oauth2Spec.AuthorizationEndpoint == "" && oauth2Spec.TokenEndpoint == "" {
+			return nil, fmt.Errorf("%w: you have to either set the OpenID issuer or authorization and token endpoints for oauth2 authentication", ErrOAuth2EndpointsMissing)
+		}
+	case supabasev1alpha1.DashboardAuthTypeBasic:
+		basicAuthSpec := dashboardEndpointSpec.Basic()
+		if len(basicAuthSpec.UsersInline) == 0 && basicAuthSpec.PlaintextUsersSecretRef == "" {
+			return nil, fmt.Errorf("%w: neither inline users are specified nor a secret for plaintext credentials was referenced", ErrBasicAuthNoUsers)
+		}
+
+		if len(basicAuthSpec.UsersInline) == 0 {
+			warnings = append(warnings, "no inline users were specified, make sure to have at least one username - password pair in the referenced secret otherwise the setup will be skipped")
+		}
+	}
+
+	return warnings, nil
+}