oidc-agent
  • Introduction
  • Quickstart
  • Migrating to oidc-agent 5
  • Installation
    • Linux
    • MacOS
    • Windows
  • Configuration
    • oidc-agent Directory
    • General Configuration
    • Custom Request Parameter
    • Configuration of Providers
    • oidc-agent Integration
    • Agent Forwarding
  • Usage
    • oidc-agent
      • Starting oidc-agent
      • General Usage
      • Detailed Information About All Options
    • oidc-agent-service
    • oidc-keychain
      • General Usage
      • Detailed Information About All Options
    • oidc-gen
      • General Usage
      • Detailed Information About All Options
      • Integrate With Different Providers
        • B2Access
        • EGI
        • Elixir
        • Google
        • HBP
        • Helmholtz AAI
        • IAM (INDIGO/DEEP)
        • KIT
        • Any Other Provider
        • Known Issues
        • Client Configuration Values
    • oidc-add
      • General Usage
      • Detailed Information About All Options
    • oidc-token
      • General Usage
      • Detailed Information About All Options
    • oidc-tokensh
      • General Usage
      • Detailed Information About All Options
    • Other Applications Using oidc-agent
    • Tips
    • oidc-agent-server
  • Windows
    • Installation
  • MAC OS
    • State of Feature Support
    • Installation
  • Security
    • Privilege Separation & Architecture
    • Account Configuration Files
    • Credentials
    • Memory
    • Agent Locking
    • Communication
    • Encryption Passwords
    • Autounload (Lifetime)
    • User Confirmation
    • Tracing
    • seccomp
    • Final Note
  • API
    • liboidc-agent4
    • liboidcagent-go
    • liboidcagent-py
    • IPC-API
Powered by GitBook
On this page
  • Try Dynamic Client Registration
  • Generate the Account Configuration
  • Still no Success?
  1. Usage
  2. oidc-gen
  3. Integrate With Different Providers

Any Other Provider

PreviousKITNextKnown Issues

Last updated 5 years ago

If your provider was not listed above, do not worry - oidc-agent should work with any OpenID Provider. Please follow these steps.

Try Dynamic Client Registration

If you already have a registered client you can see .

Dynamic client registration is not supported by all OpenID Providers, so it might fail. Anyway, try registering a client dynamically by calling oidc-gen and providing the issuer url when being prompted.

If dynamic client registration is not supported, oidc-gen will tell you this. In that case you have to register the client manually through the provider's web interface (see for help with manual client registration) and then go to .

Some providers have a protected registration endpoint which is not public. If so oidc-agent needs an initial access token for authorization at the endpoint. Please call oidc-gen with the --at option to pass the access token to oidc-gen.

When the client was successfully registered the account configuration should be generated automatically and you should be able to save and use it.

Generate the Account Configuration

If you registered a client manually call oidc-gen with the -m flag or if you have a file containing the json formatted client configuration pass it to oidc-gen with the -f flag.

After entering the required information oidc-agent should be able to generate the account configuration which is then usable.

Still no Success?

If you still were not be able to get oidc-agent working with that provider, please contact the provider or us at . We will try to figure out if the problem is with oidc-agent or the provider.

Client Configuration Values
https://github.com/indigo-dc/oidc-agent/issues
Generate the Account Configuration
Generate the Account Configuration