oidc-provider
oidc-provider is an OAuth 2.0 Authorization Server with OpenID Connect and many
additional features and standards implemented.
Table of Contents
Implemented specs & features
The following specifications are implemented by oidc-provider. Note that not all features are
enabled by default, check the configuration section on how to enable them.
The following draft specifications are implemented by oidc-provider.
Updates to draft specification versions are released as MINOR library versions,
if you utilize these specification implementations consider using the tilde ~
operator in your
package.json since breaking changes may be introduced as part of these version updates. Alternatively
acknowledge the version and be notified of breaking changes as part of
your CI.
Certification

Filip Skokan has certified that oidc-provider
conforms to the following profiles of the OpenID Connect™ protocol
- Basic OP, Implicit OP, Hybrid OP, Config OP, Dynamic OP, Form Post OP, 3rd Party-Init OP
- Back-Channel OP, RP-Initiated OP
- FAPI 1.0 OP w/ MTLS, FAPI 1.0 OP w/ Private Key (Both Final and Implementer's Draft 02)
- FAPI 1.0 OP w/ MTLS PAR, FAPI 1.0 OP w/ Private Key PAR (Both Final and Implementer's Draft 02)
- FAPI-CIBA OP poll w/ MTLS, FAPI-CIBA OP poll w/ Private Key, FAPI-CIBA OP Ping w/ MTLS, FAPI-CIBA OP Ping w/ Private Key
If you want to quickly add OpenID Connect authentication to Node.js apps, feel free to check out Auth0's Node.js SDK and free plan at auth0.com/developers.
Support
If you or your business use oidc-provider, or you need help using/upgrading the module, please consider becoming a sponsor so I can continue maintaining it and adding new features carefree. The only way to guarantee you get feedback from the author & sole maintainer of this module is to support the package through GitHub Sponsors. I make it a best effort to try and answer newcomers regardless of being a supporter or not, but if you're asking your n-th question and don't get an answer it's because I'm out of handouts and spare time to give.
Get started
You may check the example folder or follow a step by step example to see
which of those fits your desired application setup.
Also be sure to check the available configuration docs section.
oidc-provider can be mounted to existing connect, express, fastify, hapi, or koa applications, see
how. The provider allows to be extended and configured in
various ways to fit a variety of uses. See the documentation.
const { Provider } = require('oidc-provider');
const configuration = {
clients: [{
client_id: 'foo',
client_secret: 'bar',
redirect_uris: ['http://lvh.me:8080/cb'],
}],
};
const oidc = new Provider('http://localhost:3000', configuration);
oidc.callback()
oidc.app
const server = oidc.listen(3000, () => {
console.log('oidc-provider listening on port 3000, check http://localhost:3000/.well-known/openid-configuration');
});
Recipes
Collection of useful configurations use cases are available over at recipes.
Events
Your oidc-provider instance is an event emitter, using event handlers you can hook into the various
actions and i.e. emit metrics or that react to specific triggers. In some scenarios you can even
change the defined behavior.
See the list of available emitted event names and their description.