Dashboard
Manage your profile, view registered apps, and control your active session.
OpenID Connect Identity Provider
OIDCFlow is an open identity provider. Users get one secure account. Companies integrate OIDC in minutes. Built to the spec, designed for learning.
Who is this for?
Whether you are a user looking for a secure login experience or a company wanting to delegate identity, OIDCFlow has you covered.
Create a personal account and use it to sign in to any application that integrates with OIDCFlow. One identity, every connected app.
Register your application and let OIDCFlow handle user authentication. Get a client ID, set redirect URIs, and integrate in minutes.
Features
A complete, spec-compliant OIDC identity provider. Every endpoint you need, every security primitive built in.
Fully-spec discovery document advertising all endpoints, signing algorithms, supported scopes, and claim types. Auto-detectable by any OIDC library.
Full OAuth 2.0 Authorization Code Flow with mandatory PKCE (S256). Redirect users to OIDCFlow; receive a short-lived code back at your URI.
Proof Key for Code Exchange (RFC 7636) blocks interception attacks. Exchange your code + verifier for access, ID, and refresh tokens.
RS256-signed access tokens and ID tokens. Public keys published via JWKS so any service can independently verify tokens without calling back.
Users authenticate once and access all connected apps seamlessly. Call the userinfo endpoint with any valid access token to fetch profile claims.
Server-to-server logout notifications via signed logout tokens. When a user signs out, every connected app is notified instantly — no polling needed.
Opaque refresh tokens with automatic rotation on each use. Revocation on logout cleans up all tokens for the user+client pair simultaneously.
Register your app as an OAuth client in seconds. Receive a client ID, configure redirect URIs, and optionally set a back-channel logout endpoint.
Built-in Backend-For-Frontend flow: tokens stay server-side, the browser only holds an HttpOnly session cookie. Zero token leakage to JavaScript.
Integration guide
Four steps to add OIDCFlow login to your application.
POST to /company/register with your app name, redirect URI, and admin credentials. Receive your client_id.
Send users to /authorize with your client_id, a PKCE code challenge, and a redirect_uri.
Users sign in with their OIDCFlow account and grant consent for the requested scopes: openid profile email.
POST to /oauth/token with your code and PKCE verifier. Receive access, ID, and refresh tokens. Call /oauth/userinfo to get claims.
Developer Tools
Manage your profile, view registered apps, and control your active session.
Register your app as an OAuth client and receive your client ID instantly.
Inspect the discovery document, JWKS, and all endpoints this IdP exposes.