LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 - Access
3.1.0 - Access
  • Introduction
  • The Service
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Architecture
      • Modules
      • Folder structure
      • Startup
    • Getting started
    • Installation
      • Container
      • Linux
      • Windows
    • Operations
      • Configuration
      • Metrics
      • Health check
      • Logging
        • System logging
        • Event logging
      • SBOM & license material
  • Modules
    • External modules
    • Internal modules
      • SAMLModule
      • OIDC
        • OpenID Configuration endpoint
        • JWKS endpoint
        • Authorization endpoint
        • Token endpoint
          • Authorization code
          • Refresh token
        • User info endpoint
        • Introspection endpoint
        • End session endpoint
  • Configuration reference
    • Introduction
    • Terms and abbreviations
    • Property expansion
    • File inclusion
    • Secrets management
    • Examples
  • Authenticators
    • Introduction
    • Common configuration
    • Web Authenticator API
    • Flow control
      • Selector
      • AuthController
      • SSO Authenticator
      • Chain
      • Impersonate
      • Impersonate With Search
    • Credential validators
      • SITHS eID
        • With QR or "app-switch"
      • BankID
        • On another device
        • On mobile device
      • Freja e-ID
        • With user input
        • With QR or "app-switch"
      • Mobile ID
        • With QR or "app-switch"
      • Header based
        • Certificate
      • Pointsharp Net iD Access server
        • On another device
        • On same device
      • Integrated windows login, IWA
      • User name & password
      • User lookup
      • OTP validator
      • Passkey validator
      • Exposed metrics
      • Test
        • Static SAML
        • No operation
    • Protocol managers
      • SAML
        • SAML IDP
        • SAML SP
        • IDP Discovery Service
      • OIDC
        • Authorization Code Flow
        • Implicit Flow
        • OIDC Relying Party
    • UI
Powered by GitBook
On this page
  1. Modules
  2. Internal modules
  3. OIDC
  4. Token endpoint

Authorization code

For the authorization code flow, calling the token endpoint is the second step of the flow. HTTP POST is used for the token endpoint.

Example: http://127.0.0.1:8080/oidc/tenant1/token-endpoint

Request parameters

These parameters must be posted as a part of the URL-encoded form values.

Note: Mandatory request parameters can be configured on each OIDC provider. Mandatory values below are the default behaviour.

Parameter
Description
Mandatory

code

The value that was returned from the authorization endpoint.

client_id

Identifies the client and must match the value configured in FortifiedID Integrity.

client_secret

Authenticates the client and must match the value configured in FortifiedID Integrity.

grant_type

Supported value is authorization_code.

redirect_uri

Specifies the redirect location. It must match the value configured in FortifiedID Integrity.

code_verifier

Required if code_challenge was used in the authorization endpoint request.

Client authentication methods

Parameter: token_endpoint_auth_methods_supported

in discovery_meta configuration section.

FortifiedID Integrity supports the following methods:

Method
Description

client_secret_basic

Provide 'clientid' and 'client_secret' in the Authorization header. (Basic auth)

client_secret_post

Provide 'clientid' and 'client_secret' as parameters in the POST request body.

none

For PKCE use. Provide the 'code_verifier' as a parameter in the POST request body.

"discovery_meta": {
    ...
    "token_endpoint_auth_methods_supported" : 
        ["client_secret_post", "client_secret_basic"]
    ...
}
PreviousToken endpointNextRefresh token