Client Configuration Guide for Vouch (OIDC Identity Provider)
1. Overview
This guide explains how to configure an OIDC-compliant client to authenticate users through Vouch, Gataca Identity Provider (IdP). The steps below assume that the client has already been registered and has received their credentials (client_id
and client_secret
) along with their configured redirect_uri
. (Configuring Vouch).
Vouch supports the Authorization Code Flow, and is fully compliant with the OpenID Connect 1.0 standard.
2. Endpoints
Vouch exposes the following OIDC endpoints:
Discovery Document
Authorization
Token
User Info
JWKS (public keys)
We recommend that clients use the Discovery Document to automatically configure endpoints.
3. Using an OIDC Client Library
If you are using a standard OIDC client library — such as openid-client in Node.js, python-oidc, spring-security-oauth2, or similar — you do not need to manually implement the authorization flow (redirects, token exchanges, validations, etc.).
These libraries take care of:
• Redirecting the user to the authorization endpoint.
• Handling the callback and exchanging the authorization code for tokens.
• Validating the ID token, including signature and claims (like iss, aud, exp, etc.).
• Optionally retrieving user information via the userinfo endpoint.
• Managing session state, token storage, and refresh logic.
All you need to do is configure the library with the correct settings from Vouch:
OIDC Provider URL
Client ID
Provided during registration
Client Secret
Provided during registration
Redirect URI
Must match what was registered (e.g., https://app.example.com/callback)
Response Type
code
Grant Type
authorization_code
Scopes
openid
(minimum), optionally legalAge
, email
, ...
Example (Node.js)
By relying on the client library, you avoid dealing with protocol-level details, reduce errors, and follow security best practices by default.
Last updated