32 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			32 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
# OAuth2 Provider
 | 
						|
 | 
						|
This provider supports both generic OAuth2 as well as OpenID Connect
 | 
						|
 | 
						|
Scopes can be configured using Scope Mappings, a type of [Property Mappings](../property-mappings/index.md#scope-mapping).
 | 
						|
 | 
						|
Endpoint | URL
 | 
						|
---------|---
 | 
						|
Authorization        | `/application/o/authorize/`
 | 
						|
Token                | `/application/o/token/`
 | 
						|
User Info            | `/application/o/userinfo/`
 | 
						|
End Session          | `/application/o/end-session/`
 | 
						|
Introspect           | `/application/o/end-session/`
 | 
						|
JWKS                 | `/application/o/<application slug>/jwks/`
 | 
						|
OpenID Configuration | `/application/o/<application slug>/.well-known/openid-configuration`
 | 
						|
 | 
						|
## GitHub Compatibility
 | 
						|
 | 
						|
This provider also exposes a GitHub-compatible endpoint. This endpoint can be used by applications, which support authenticating against GitHub Enterprise, but not generic OpenID Connect.
 | 
						|
 | 
						|
To use any of the GitHub Compatibility scopes, you have to use the GitHub Compatibility Endpoints.
 | 
						|
 | 
						|
 | 
						|
Endpoint | URL
 | 
						|
---------|---
 | 
						|
Authorization        | `/login/oauth/authorize`
 | 
						|
Token                | `/login/oauth/access_token`
 | 
						|
User Info            | `/user`
 | 
						|
User Teams Info      | `/user/teams`
 | 
						|
 | 
						|
To access the user's email address, a scope of `user:email` is required. To access their groups, `read:org` is required. Because these scopes are handled by a different endpoint, they are not customisable as a Scope Mapping.
 |