You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/authenticate/custom-configurations/custom-oauth2-connection.mdx
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,24 +7,24 @@ relatedArticles:
7
7
- 26e55a64-13dd-4c7b-b9ad-e7595903ddc8
8
8
- 64079be6-be72-4b63-a9d1-4466af4d49be
9
9
- a5225946-27ad-41c0-a3c1-9a6d735e3efb
10
-
description: Step-by-step guide to setting up custom OAuth2 connections including OAuth provider setup, credentials configuration, and Kinde integration.
10
+
description: Step-by-step guide to setting up custom OAuth2 and OIDC connections including OAuth provider setup, credentials configuration, and Kinde integration.
You can enable users to sign up and sign in using their credentials from any OAuth2-compatible identity provider. To set this up, you need access to your OAuth2 provider's developer console and a little technical know-how. We recommend setting this up in a non-production environment first, to test the connection thoroughly.
23
+
You can enable users to sign up and sign in using their credentials from any OAuth2- and Open ID connection- compatible identity provider. To set this up, you need access to your provider's developer console and a little technical know-how. We recommend setting this up in a non-production environment first, to test the connection thoroughly.
24
24
25
-
Custom OAuth 2.0 connections allow you to integrate with any OAuth2-compatible identity provider that isn't natively supported by Kinde. This includes custom identity providers, enterprise solutions, or specialized authentication services.
25
+
Custom OAuth 2.0 and Open ID connections allow you to integrate with any compatible identity provider that isn't natively supported by Kinde. This includes custom identity providers, enterprise solutions, or specialized authentication services.
26
26
27
-
## OAuth 2.0 provider requirements
27
+
## OAuth 2.0 / OIDC provider requirements
28
28
29
29
Before connecting your custom OAuth2 provider, ensure it supports the OAuth2 authorization code flow and can provide user profile information including email address. The provider must also support HTTPS for all endpoints.
30
30
@@ -36,9 +36,9 @@ Disclaimer: the following steps are a guide to what needs to happen on the custo
36
36
37
37
## Step 1: Get the custom connection credentials
38
38
39
-
1. Navigate to your OAuth2 provider's developer console or admin panel.
40
-
2. Create a new OAuth2 application or client.
41
-
3. Configure your OAuth2 application settings:
39
+
1. Navigate to your provider's developer console or admin panel.
40
+
2. Create a new application or client.
41
+
3. Configure your application settings:
42
42
43
43
1. Set the application type to **Web Application** or **Confidential Client**.
44
44
2. Add your **Authorized redirect URIs**. These are your Kinde domain or custom domain callback URLs. For example, `account.customdomain.com/login/callback`. If you don't have this, you can copy it from the Kinde connection and add it later.
@@ -49,11 +49,11 @@ Disclaimer: the following steps are a guide to what needs to happen on the custo
49
49
5. Save your application configuration.
50
50
6. Copy the following information, which is required to set up the Kinde connection:
51
51
52
-
-**Authorization URL**: The OAuth2 authorization endpoint URL
53
-
-**Token URL**: The OAuth2 token endpoint URL
52
+
-**Authorization URL**: The authorization endpoint URL
53
+
-**Token URL**: The token endpoint URL
54
54
-**User Info URL**: The endpoint to retrieve user profile information
55
-
-**Client ID**: Your OAuth2 application's client ID
56
-
-**Client Secret**: Your OAuth2 application's client secret
55
+
-**Client ID**: Your IdP application client ID
56
+
-**Client Secret**: Your IdP application client secret
57
57
58
58
## Step 2: Set up the Kinde connection
59
59
@@ -76,14 +76,14 @@ Disclaimer: the following steps are a guide to what needs to happen on the custo
76
76
9. In the **Callback URL** section:
77
77
1. If you use Kinde's domain as your default, copy the Kinde domain URL.
78
78
2. If you use custom domains, select the **Use custom domain instead** switch.
79
-
3. If you have only one custom domain, copy the Custom domain URL. If you have custom domains for multiple organizations, select each one from the list and copy the callbacks for each. You need to enter all custom domain callbacks in your OAuth2 app.
79
+
3. If you have only one custom domain, copy the Custom domain URL. If you have custom domains for multiple organizations, select each one from the list and copy the callbacks for each. You need to enter all custom domain callbacks in your app.
80
80
10. Select which applications to switch this on for. If you are in a prod environment, this makes the connection live.
81
81
11. Select **Save**.
82
-
12. Use the copied Callback URL to finish setting up your OAuth2 app, see below.
82
+
12. Use the copied Callback URL to finish setting up the provider configuration, see below.
83
83
84
84
## Step 3: Add the callback URL to your custom connection
85
85
86
-
1. Navigate to your OAuth2 provider's developer console or admin panel.
86
+
1. Navigate to your provider's developer console or admin panel.
87
87
2. Enter the callback URL you copied from the Kinde configuration window.
88
88
3. Save.
89
89
@@ -99,9 +99,9 @@ After configuring your custom OAuth2 connection, test it thoroughly in a non-pro
99
99
100
100
If you encounter issues with your custom OAuth2 connection, here's some things to try.
101
101
102
-
1.**Verify endpoint URLs**: Ensure all OAuth2 endpoint URLs are correct and accessible
103
-
2.**Check scopes**: Confirm that your OAuth2 provider supports the required scopes
104
-
3.**Validate callback URLs**: Ensure all callback URLs are properly configured in your OAuth2 application
102
+
1.**Verify endpoint URLs**: Ensure all endpoint URLs are correct and accessible
103
+
2.**Check scopes**: Confirm that your provider supports the required scopes
104
+
3.**Validate callback URLs**: Ensure all callback URLs are properly configured in the IdP application
105
105
4.**Review user info response**: Verify that the user info endpoint returns data in the expected format
106
106
107
107
For additional support, contact Kinde support or refer to your OAuth2 provider's documentation.
0 commit comments