Before you begin:
1. Gather endpoint details of your Identity Provider
Authorization Endpoint examples:
- Google:
https://accounts.google.com/o/oauth2/v2/authorize
- Entra ID:
https://login.microsoftonline.com/<tenant-id>/oauth2/v2.0/authorize
- Auth0:
https://<your-auth0-domain>/authorize
- Okta:
https://<your-okta-domain>/oauth2/default/v1/authorize
Token Endpoint examples:
- Google:
https://oauth2.googleapis.com/token
(Google’s actual endpoint might vary slightly, so check their documentation.)
- Entra ID:
https://login.microsoftonline.com/<tenant-id>/oauth2/v2.0/token
- Auth0:
https://<your-auth0-domain>/oauth/token
- Okta:
https://<your-okta-domain>/oauth2/default/v1/token
2. Register your OIDC client and get Client ID and Client Secret
Links to Popular IDP Application Registration portals:
- Google Cloud Console (for Google APIs and OAuth): https://console.cloud.google.com/ (You’ll need a Google account)
- Entra ID (Azure AD): https://portal.azure.com/ (You’ll need a Microsoft Azure subscription) Look for “App registrations” within your Azure AD tenant.
- Auth0 Dashboard: https://manage.auth0.com/ (You’ll need an Auth0 account)
- Okta Developer Account: https://developer.okta.com/ (You’ll need an Okta developer account)
- Amazon Cognito: https://aws.amazon.com/cognito/ (Part of the AWS ecosystem, requires an AWS account)
3. Once application registration is done, configure it with below Redirect URIs / Reply URLs:
- https://id.cloud365.in/AuthCodeGetCode/Callback
- https://id.cloud365.in/PkceGetCode/Callback
- https://id.cloud365.in/Implicit/Callback
Note: All these Redirect URIs are required to test all Authentication flows using this app.
4. Configure required scopes and claims to be returned in your tokens.