Connecting an OIDC Client
Any OIDC-compliant library or framework can use Autentico as its identity provider. The process is the same regardless of language or framework: point the library at the discovery URL, provide client credentials, and let the library handle the protocol.
Discovery URL
Section titled “Discovery URL”https://auth.example.com/oauth2/.well-known/openid-configurationMost OIDC libraries accept this URL and auto-configure all endpoints from it.
What you need
Section titled “What you need”| Item | Where to find it |
|---|---|
| Discovery URL | https://<your-autentico-host>/oauth2/.well-known/openid-configuration |
client_id | Returned when you register the client |
client_secret | Returned once at client registration (confidential clients only) |
| Redirect URI | The callback URL you registered for this client |
General configuration steps
Section titled “General configuration steps”-
Register the client in the Admin UI or via
POST /oauth2/register. Note theclient_idandclient_secret. -
Configure your library with:
- The discovery URL (or individual endpoint URLs)
client_idclient_secret(if confidential)- The redirect URI you registered
-
Initiate the authorization flow — your library will redirect users to Autentico’s login page, handle the callback, and exchange the authorization code for tokens.
-
Verify the
issclaim in received ID tokens matcheshttps://auth.example.com/oauth2(or your configured issuer).
Scopes to request
Section titled “Scopes to request”openid profile emailopenid— required; triggers ID token issuanceprofile— includesnameclaimemail— includesemailandemail_verifiedclaims
Keycloak compatibility
Section titled “Keycloak compatibility”Autentico exposes Keycloak-compatible endpoint aliases:
/oauth2/protocol/openid-connect/token/oauth2/protocol/openid-connect/userinfoIf your library or application is pre-configured for Keycloak, these aliases let you point it at Autentico with minimal configuration changes.