Skip to main content

Generic IAM/IdP Provider Walkthrough

If you are not using one of the other IAM providers mentioned in this guide, but you are still implementing OpenID Connect to delegate authentication functions, authID can still be integrated into your solution. The only difference might be found in the UI you are using, or if you are simply integrating directly into application code.

The setup steps in this case are even simpler:

  • Create a new integration in the authID Identity Portal
  • Configure authID as an identity provider within your application

Required Parameters

caution

You application must use the authorization_code grant type in order to use this service.

You will need the following pieces of information:

  • Client ID: obtained from your integration details upon creation
  • Client Secret: obtained from your integration details upon creation
  • Well-known Configuration URL: use this with automatic discovery or enter the below endpoints manually
https://id.authid.ai/oidc/web/.well-known/openid-configuration
  • Endpoints
{
"issuer": "https://id.authid.ai/oidc/web",
"authorization_endpoint": "https://id.authid.ai/oidc/web/connect/authorize",
"token_endpoint": "https://id.authid.ai/oidc/web/connect/token",
"end_session_endpoint": "https://id.authid.ai/oidc/web/connect/logout",
"userinfo_endpoint": "https://id.authid.ai/oidc/web/connect/userinfo",
"jwks_uri": "https://id.authid.ai/oidc/web/.well-known/jwks"
}