The following sample shows the discovery endpoint, GET {{davinciAuthPath}}/auth/{{companyID}}/.well-known/openid-configuration
, which returns the OpenID Connect provider metadata document for the issuer, https://api.singularkey.com/{{companyID}}
.
The response is a set of claims about the OpenID provider’s configuration, including all necessary endpoints and public key location information.
Claim | Description |
---|---|
issuer |
A string that specifies the URL that the provider uses as its issuer identifier. |
authorization_endpoint |
A string that specifies the URL of the provider’s OAuth 2.0 authorization endpoint. |
token_endpoint |
A string that specifies the URL of the provider’s OAuth 2.0 token endpoint. |
userinfo_endpoint |
A string that specifies the URL of the provider’s OAuth 2.0 userinfo endpoint, which returns claims about the authenticated end user. |
jwks_uri |
A string that specifies the URL of the provider’s OAuth 2.0 JSON Web Key Set document. |
token_endpoint_auth_methods_supported |
An array that specifies the list of client authentication methods supported by the token endpoint. Options are client_secret_basic and client_secret_post . |
id_token_signing_alg_values_supported |
An array that specifies the list of signing algorithms supported by the provider for the ID token to encode the claims in a JWT. |
response_types_supported |
An array that specifies the list of response types that the provider supports. Options are code , token , id_token , and token id_token . |
scopes_supported |
An array that specifies the list of scopes that the resource server supports. |
subject_types_supported |
An array that specifies the list of the subject identifier types that the provider supports. Options are public . |