Manage users, create OAuth2 applications (tenants), configure permissions, and monitor OAuth2/OIDC authentication with a powerful, secure, and easy-to-use interface.
To access the management portal, you need to authenticate using OTP (One-Time Password):
Note: The first user to log in will automatically be assigned the ADMIN role. Subsequent users will be MEMBER role by default.
As an admin, you can manage all system users:
Important: Only ADMIN role users can manage other users. MEMBER role users have read-only access. The first user to log in automatically becomes ADMIN.
Each OAuth2 application acts as a "tenant" - a separate client that can authenticate users. To register a new application/tenant:
https://yourapp.com/callbackopenid profile emailSecurity Tip: Store Client Secret securely. You can rotate it anytime from the application detail page.
To integrate OAuth2/OIDC into your application:
Discovery Endpoint: GET /.well-known/openid-configuration for OIDC configuration
Create and manage fine-grained permissions for RBAC:
@RequirePermissions decorator in your backend codeExample: Permission "tickets:create" allows users to create tickets. Permission "tickets:delete" allows deletion.
Follow these steps to get your authentication service up and running:
npm run prisma:migrate in the backendPro Tip: Bookmark the Swagger documentation at http://localhost:3001/api/docs for API reference while developing.
Once the backend is running, access the interactive API documentation at:
Full REST API for programmatic access to all features.
Interactive Swagger documentation with try-it-out functionality
Standard OIDC discovery endpoint for automatic configuration.
Use this URL in OIDC libraries for automatic configuration
JSON Web Key Set for JWT token verification.
Public keys for verifying access tokens
All data is stored in PostgreSQL with the "oauth" schema.
See backend DATABASE.md for schema documentation, indexing strategies, and best practices.