Skip to content

Connecting an OIDC Client

Any OIDC-compliant library or framework can use Autentico as its identity provider. The process is the same regardless of language or framework: point the library at the discovery URL, provide client credentials, and let the library handle the protocol.

https://auth.example.com/oauth2/.well-known/openid-configuration

Most OIDC libraries accept this URL and auto-configure all endpoints from it.

ItemWhere to find it
Discovery URLhttps://<your-autentico-host>/oauth2/.well-known/openid-configuration
client_idReturned when you register the client
client_secretReturned once at client registration (confidential clients only)
Redirect URIThe callback URL you registered for this client
  1. Register the client in the Admin UI or via POST /oauth2/register. Note the client_id and client_secret.

  2. Configure your library with:

    • The discovery URL (or individual endpoint URLs)
    • client_id
    • client_secret (if confidential)
    • The redirect URI you registered
  3. Initiate the authorization flow — your library will redirect users to Autentico’s login page, handle the callback, and exchange the authorization code for tokens.

  4. Verify the iss claim in received ID tokens matches https://auth.example.com/oauth2 (or your configured issuer).

openid profile email
  • openid — required; triggers ID token issuance
  • profile — includes name claim
  • email — includes email and email_verified claims

Autentico exposes Keycloak-compatible endpoint aliases:

/oauth2/protocol/openid-connect/token
/oauth2/protocol/openid-connect/userinfo

If your library or application is pre-configured for Keycloak, these aliases let you point it at Autentico with minimal configuration changes.