Skip to content

Protocol Overview

Autentico implements OAuth 2.0 (RFC 6749) and OpenID Connect Core 1.0. This section documents each grant type, the token format, and the supporting protocol endpoints.

Grant typeUse case
authorization_code + PKCEBrowser apps, mobile apps, server-side web apps — the standard secure flow
refresh_tokenExchange a refresh token for new access/ID tokens without re-authentication
password (ROPC)Trusted first-party apps only — credentials submitted directly to the token endpoint
client_credentialsMachine-to-machine — no user involved
EndpointPurpose
/.well-known/openid-configurationOIDC discovery document
/.well-known/jwks.jsonPublic keys for token verification
/oauth2/authorizeAuthorization endpoint — starts the auth flow
/oauth2/tokenToken endpoint — exchange codes and refresh tokens
/oauth2/userinfoUserInfo endpoint — user claims for access tokens
/oauth2/introspectToken introspection (RFC 7662)
/oauth2/revokeToken revocation (RFC 7009)
/oauth2/logoutLogout — deactivates the SSO session

Keycloak-compatible aliases are available for the token and userinfo endpoints:

  • /oauth2/protocol/openid-connect/token
  • /oauth2/protocol/openid-connect/userinfo

The /oauth2 path prefix is configurable via AUTENTICO_APP_OAUTH_PATH.