OIDC Provider
The OIDC Provider Plugin enables you to build and manage your own OpenID Connect (OIDC) provider, granting full control over user authentication without relying on third-party services like Okta or Azure AD. It also allows other services to authenticate users through your OIDC provider.
Key Features:
- Client Registration: Register clients to authenticate with your OIDC provider.
- Dynamic Client Registration: Allow clients to register dynamically.
- Authorization Code Flow: Support the Authorization Code Flow.
- JWKS Endpoint: Publish a JWKS endpoint to allow clients to verify tokens. (Not fully implemented)
- Refresh Tokens: Issue refresh tokens and handle access token renewal using the
refresh_token
grant. - OAuth Consent: Implement OAuth consent screens for user authorization, with an option to bypass consent for trusted applications.
- UserInfo Endpoint: Provide a UserInfo endpoint for clients to retrieve user details.
This plugin is in active development and may not be suitable for production use. Please report any issues or bugs on GitHub.
Installation
Mount the Plugin
Add the OIDC plugin to your auth config. See OIDC Configuration on how to configure the plugin.
Migrate the Database
Run the migration or generate the schema to add the necessary fields and tables to the database.
See the Schema section to add the fields manually.
Add the Client Plugin
Add the OIDC client plugin to your auth client config.
Usage
Once installed, you can utilize the OIDC Provider to manage authentication flows within your application.
Register a New Client
To register a new OIDC client, use the oauth2.register
method.
Once the application is created, you will receive a clientId
and clientSecret
that you can display to the user.
Consent Screen
When a user is redirected to the OIDC provider for authentication, they may be prompted to authorize the application to access their data. This is known as the consent screen. By default, Better Auth will display a sample consent screen. You can customize the consent screen by providing a consentPage
option during initialization.
The plugin will redirect the user to the specified path with a client_id
and scope
query parameter. You can use this information to display a custom consent screen. Once the user consents, you can call oauth2.consent
to complete the authorization.
The client_id
and other necessary information are stored in the browser cookie, so you don't need to pass them in the request. If they don't exist in the cookie, the consent method will return an error.
Handling Login
When a user is redirected to the OIDC provider for authentication, if they are not already logged in, they will be redirected to the login page. You can customize the login page by providing a loginPage
option during initialization.
You don't need to handle anything from your side; when a new session is created, the plugin will handle continuing the authorization flow.
Configuration
OIDC Metadata
Customize the OIDC metadata by providing a configuration object during initialization.
JWKS Endpoint (Not Fully Implemented)
For JWKS support, you need to use the jwt
plugin. It exposes the /jwks
endpoint to provide the public keys.
Currently, the token is signed with the application's secret key. The JWKS endpoint is not fully implemented yet.
Dynamic Client Registration
If you want to allow clients to register dynamically, you can enable this feature by setting the allowDynamicClientRegistration
option to true
.
This will allow clients to register using the /register
endpoint to be publicly available.
Schema
The OIDC Provider plugin adds the following tables to the database:
OAuth Application
Table Name: oauthApplication
Field Name | Type | Key | Description |
---|---|---|---|
id | string | Database ID of the OAuth client | |
clientId | string | Unique identifier for each OAuth client | |
clientSecret | string | - | Secret key for the OAuth client |
name | string | - | Name of the OAuth client |
redirectURLs | string | - | Comma-separated list of redirect URLs |
metadata | string | Additional metadata for the OAuth client | |
type | string | - | Type of OAuth client (e.g., web, mobile) |
disabled | boolean | - | Indicates if the client is disabled |
userId | string | ID of the user who owns the client. (optional) | |
createdAt | Date | - | Timestamp of when the OAuth client was created |
updatedAt | Date | - | Timestamp of when the OAuth client was last updated |
OAuth Access Token
Table Name: oauthAccessToken
Field Name | Type | Key | Description |
---|---|---|---|
id | string | Database ID of the access token | |
accessToken | string | - | Access token issued to the client |
refreshToken | string | - | Refresh token issued to the client |
accessTokenExpiresAt | Date | - | Expiration date of the access token |
refreshTokenExpiresAt | Date | - | Expiration date of the refresh token |
clientId | string | ID of the OAuth client | |
userId | string | ID of the user associated with the token | |
scopes | string | - | Comma-separated list of scopes granted |
createdAt | Date | - | Timestamp of when the access token was created |
updatedAt | Date | - | Timestamp of when the access token was last updated |
OAuth Consent
Table Name: oauthConsent
Field Name | Type | Key | Description |
---|---|---|---|
id | string | Database ID of the consent | |
userId | string | ID of the user who gave consent | |
clientId | string | ID of the OAuth client | |
scopes | string | - | Comma-separated list of scopes consented to |
consentGiven | boolean | - | Indicates if consent was given |
createdAt | Date | - | Timestamp of when the consent was given |
updatedAt | Date | - | Timestamp of when the consent was last updated |
Options
allowDynamicClientRegistration: boolean
- Enable or disable dynamic client registration.
metadata: OIDCMetadata
- Customize the OIDC provider metadata.
loginPage: string
- Path to the custom login page.
consentPage: string
- Path to the custom consent page.