LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 - Access
3.1.0 - Access
  • Introduction
  • The Service
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Architecture
      • Modules
      • Folder structure
      • Startup
    • Getting started
    • Installation
      • Container
      • Linux
      • Windows
    • Operations
      • Configuration
      • Metrics
      • Health check
      • Logging
        • System logging
        • Event logging
      • SBOM & license material
  • Modules
    • External modules
    • Internal modules
      • SAMLModule
      • OIDC
        • OpenID Configuration endpoint
        • JWKS endpoint
        • Authorization endpoint
        • Token endpoint
          • Authorization code
          • Refresh token
        • User info endpoint
        • Introspection endpoint
        • End session endpoint
  • Configuration reference
    • Introduction
    • Terms and abbreviations
    • Property expansion
    • File inclusion
    • Secrets management
    • Examples
  • Authenticators
    • Introduction
    • Common configuration
    • Web Authenticator API
    • Flow control
      • Selector
      • AuthController
      • SSO Authenticator
      • Chain
      • Impersonate
      • Impersonate With Search
    • Credential validators
      • SITHS eID
        • With QR or "app-switch"
      • BankID
        • On another device
        • On mobile device
      • Freja e-ID
        • With user input
        • With QR or "app-switch"
      • Mobile ID
        • With QR or "app-switch"
      • Header based
        • Certificate
      • Pointsharp Net iD Access server
        • On another device
        • On same device
      • Integrated windows login, IWA
      • User name & password
      • User lookup
      • OTP validator
      • Passkey validator
      • Exposed metrics
      • Test
        • Static SAML
        • No operation
    • Protocol managers
      • SAML
        • SAML IDP
        • SAML SP
        • IDP Discovery Service
      • OIDC
        • Authorization Code Flow
        • Implicit Flow
        • OIDC Relying Party
    • UI
Powered by GitBook
On this page
  1. Modules
  2. Internal modules
  3. OIDC

Authorization endpoint

This is the starting point for OpenID Connect flows.

The authorization endpoint is typically used to identify a user and obtain an authorization code, which is then later exchanged for an ID token and access token. (When using the Implicit Flow type (see authenticators), the ID token and access token is delivered directly.)

The authorization endpoint is represented by authenticators, either an authorization code flow or an implicit flow authenticator. (See OIDC authenticators for configuration)

No identification is done by these authenticators. They act as a controller for issuing Json Web Tokens (JWT). Typically these authenticators is the first point of contact coming from an OpenID Connect Relying Party, requesting identification.

Actual user identification is done elsewhere.

Example: http://127.0.0.1:8080/test/authn/oidc

Request parameters

Note: Mandatory request parameters can be configured on each OIDC authenticator. Parameters marked as mandatory are the default behaviour.

Parameter
Description
Mandatory

client_id

Identifies the client and must match the value configured in FortifiedID Integrity.

redirect_uri

Redirect location where the authorization code or JWTs should be sent. It must match the value configured in FortifiedID Integrity.

response_type

'code' for authorization code flows. 'id_token' or 'id_token token' for implicit flows.

response_mode

Determines how the response should be returned. Supported values are 'form_post' and 'query'. Defaults to query.

scope

'openid' is required for authentication requests.

state

A value that is returned untampered in the response. The client application (Relying Party) can use it to remember the state of its interaction with the end user at the time of the authentication call.

max_age

Allowed time, in seconds, since the last time the end user was authenticated by FortifiedID Integrity.

nonce

The value is returned, as is, in the ID token (Part of the JWT). Used to mitigate replay attacks.

code_challenge

A code challenge for PKCE, to prevent CSRF and authorization code injection attacks. Supported hash method for client generation of this challenge is S256.

prompt

If prompt has value 'login' or no prompt parameter is used, the user is prompted to authenticate.

If prompt has value 'none' and a user session exists, the user is silently authenticated. If prompt has value 'none' and the user session does NOT exist, an error is returned.

PreviousJWKS endpointNextToken endpoint