[Integrazione dati]

OAuth2 Server (Identity Provider)

The OAuth2 Server enables the platform to act as an Identity Provider, allowing third-party applications to use "Sign in with Argus" functionality. It provides a complete OAuth 2.0 Authorization Server with support for a

Metadati del modulo

The OAuth2 Server enables the platform to act as an Identity Provider, allowing third-party applications to use "Sign in with Argus" functionality. It provides a complete OAuth 2.0 Authorization Server with support for a

Torna a tutti i moduli

Riferimento sorgente

content/modules/integration-oauth2-server-identity-provider.md

Ultimo aggiornamento

5 feb 2026

Categoria

Integrazione dati

Checksum del contenuto

e876f45cd9f2d19f

Tag

data-integrationblockchain

Documentazione renderizzata

Questa pagina renderizza Markdown e Mermaid del modulo direttamente dalla fonte pubblica di documentazione.

Overview#

The OAuth2 Server enables the platform to act as an Identity Provider, allowing third-party applications to use "Sign in with Argus" functionality. It provides a complete OAuth 2.0 Authorization Server with support for authorization code flow, refresh tokens, PKCE (Proof Key for Code Exchange), and comprehensive client management, enabling external applications, internal services, and partner integrations to authenticate users without implementing their own authentication infrastructure.

Key Features#

  • Authorization Code Flow -- Standard OAuth 2.0 flow where users authenticate through the platform and receive a short-lived authorization code that is exchanged for access tokens
  • PKCE Support -- Enhanced security for mobile apps and single-page applications that prevents authorization code interception attacks without requiring a client secret
  • Client Registration -- Register third-party applications as confidential (server-side) or public (mobile/SPA) clients with pre-registered redirect URIs
  • Scope-Based Authorization -- Granular permission control including OpenID Connect, profile, email, roles, and resource-level read/write scopes
  • Token Lifecycle Management -- Short-lived access tokens for API access, long-lived refresh tokens for session continuity, and support for immediate token revocation
  • Redirect URI Validation -- All redirect URIs must be pre-registered during client registration to prevent open redirect attacks
  • CSRF Protection -- State parameter support to prevent cross-site request forgery during the authorization flow
  • Secure Secret Storage -- Client secrets are cryptographically hashed and shown only once during registration
  • Multi-Client Support -- Users can register and manage multiple OAuth clients through a self-service interface
  • Token Storage Best Practices -- Guidance for secure token storage across server-side, web, mobile, and desktop environments

Use Cases#

  • A partner application implements "Sign in with Argus" so users can authenticate with their existing platform credentials, eliminating the need to manage separate authentication and gaining scoped access to only the data they need.
  • Internal microservices register as confidential clients to access platform APIs on behalf of users, providing unified authentication across the service architecture with a complete audit trail.
  • A native mobile application uses PKCE-enhanced authorization code flow to securely authenticate users without exposing client secrets, storing tokens in the device's secure enclave.
  • Organizations integrate external tools with the platform by registering OAuth clients, enabling single sign-on and centralized user management across their technology stack.

Integration#

The OAuth2 Server connects with the core authentication and authorization system for user identity verification, the JWT token management system for token generation and validation, and can work alongside enterprise SSO solutions for organizations that need multiple identity provider options.

Last Reviewed: 2026-02-05