zitadel/site/docs/integrate/01-openidoauth.en.md
Max Peintner 22d4c345be
docs: image gallery viewer (#905)
* add assets, photoswipe html element to body

* add single script, gallery for multiple items

* update docs for image gallery

* fix relative links

* inject image script on mount

* replace inline script

* remove facebook, twitter, pinterest sharing

* fix hover on share

* fix start img aspect radio, reduce size

* right align json script

* right align go script

* change script background
2020-10-26 13:03:51 +01:00

1.7 KiB

title description
OpenID Connect & OAuth ...

Client Types / Profiles

Single Page Application

If your client is a single page application (SPA) we recommend that you use Authorization Code in combination with Proof Key for Code Exchange.

This flow has great support with most modern languages and frameworks and is the recommended default.

In the OIDC and OAuth world this client profile is called "user-agent-based application"

Server Side Application

In the OIDC and OAuth world this client profile is called "web application"

Mobile App / Native App

In the OIDC and OAuth world this client profile is called "native application"

How to consume authorizations in your application or service


With ZITADEL you can manage the roles a project supplies to your users in the form of authorizations. On the project it can be configured how project roles are supplied to the clients. By default ZITADEL asserts the claim urn:zitadel:iam:org:project:roles to the Userinfo Endpoint

  • Assert the claim urn:zitadel:iam:org:project:roles to access_token
  • Assert the claim urn:zitadel:iam:org:project:roles to id_token
 "urn:zitadel:iam:org:project:roles": {
    "user": {
      "id1": "acme.zitadel.ch",
      "id2": "caos.ch",
    }
  }

For more details about how ZITADEL treats scopes and claims see the documentations.