./wellknown
endpoint to consume information about your IdP could help configure your integration with the IdP.
Integrating OIDC discovery into your SDK provides:
- Exposed endpoints of the IdP
- Standard OIDC supported claims and scope (this excludes custom claims and scopes defined in your tenant)
- Features supported by the IdP
https://{yourDomain}/.well-known/openid-configuration
.
Sample response
Sample implementation
For example, this is how to configure OIDC middleware for Katana v3 (OWIN):- Install the nuget package: Microsoft.Owin.Security.OpenIdConnect (v3.x.x)
- Go to
App_Start\Startup.Auth.cs
and replace your implementation with the following:
RSA algorithm for JWTs
The OIDC middleware does not support signed with symmetric keys. Make sure you configure your app to use the RSA algorithm using public/private keys.- Go to Dashboard > Settings.
- Scroll down to Advanced Settings.
- Under the OAuth tab, set
RS256
as Json Web Token(JWT) Signature Algorithm and click Save.
Configure applications with OAuth 2.0 Authorization Server Metadata
If your application or SDK references the OAuth RFC-8414 Metadata specification, you can use the alias to fetch metadata about the IdP:/.well-known/oauth-authorization-server
. For example, the Auth0 Model Context Protocol Server recommends all OAuth applications reference the OAuth Authorization Server Metadata specification.