Optional
acr_optional protocol param
The URL of the OIDC/OAuth2 provider
Optional
client_Client authentication method that is used to authenticate when using the token endpoint (default: "client_secret_post")
See https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication
Your client application's identifier as registered with the OIDC/OAuth2
Optional
client_Optional
disablePKCEWill disable PKCE validation, changing to true will not append to sign in request code_challenge and code_challenge_method. (default: false)
Optional
displayoptional protocol param
Optional
dpopDPoP enabled or disabled
Optional
extraAn object containing additional header to be including in request.
Optional
extraAn object containing additional query string parameters to be including in the authorization request.
E.g, when using Azure AD to obtain an access token an additional resource parameter is required. extraQueryParams: {resource:"some_identifier"}
Optional
extraOptional
fetchSets the credentials for fetch requests. (default: "same-origin") Use this if you need to send cookies to the OIDC/OAuth2 provider or if you are using a proxy that requires cookies
Optional
filterShould optional OIDC protocol claims be removed from profile or specify the ones to be removed (default: true) When true, the following claims are removed by default: ["nbf", "jti", "auth_time", "nonce", "acr", "amr", "azp", "at_hash"] When specifying claims, the following claims are not allowed: ["sub", "iss", "aud", "exp", "iat"]
Optional
loadFlag to control if additional identity data is loaded from the user info endpoint in order to populate the user's profile (default: false)
Optional
max_optional protocol param
Optional
mergeIndicates how objects returned from the user info endpoint as claims (e.g. address
) are merged into the claims from the
id token as a single object. (default: { array: "replace" }
)
Optional
metadataProvide metadata when authority server does not allow CORS on the metadata endpoint
Optional
metadataCan be used to seed or add additional values to the results of the discovery request
Optional
metadataOptional
omithttps://datatracker.ietf.org/doc/html/rfc6749#section-3.3 describes behavior when omitting scopes from sign in requests If the IDP supports default scopes, this setting will ignore the scopes property passed to the config. (Default: false)
Optional
post_The OIDC/OAuth2 post-logout redirect URI
Optional
promptoptional protocol param
The redirect URI of your client application to receive a response from the OIDC/OAuth2 provider
Optional
refreshOnly scopes in this list will be passed in the token refresh request.
Optional
requestDefines request timeouts globally across all requests made to the authorisation server
Optional
resourceoptional protocol param
Optional
response_Optional protocol param The response mode used by the authority server is defined by the response_type unless explicitly specified:
Optional
response_The type of response desired from the OIDC/OAuth2 provider (default: "code")
Optional
revokeWill check the content type header of the response of the revocation endpoint to match these passed values (default: [])
Optional
scopeThe scope being requested from the OIDC/OAuth2 provider (default: "openid")
Optional
signingProvide signingKeys when authority server does not allow CORS on the jwks uri
Optional
staleNumber (in seconds) indicating the age of state entries in storage for authorize requests that are considered abandoned and thus can be cleaned up (default: 900)
Optional
stateStorage object used to persist interaction state (default: window.localStorage, InMemoryWebStorage iff no window).
E.g. stateStore: new WebStorageStateStore({ store: window.localStorage })
Optional
ui_optional protocol param
The settings used to configure the OidcClient.