docs/sources/setup-grafana/configure-access/configure-authentication/generic-oauth/index.md
{{< docs/shared lookup="auth/intro.md" source="grafana" version="<GRAFANA VERSION>" >}}
Grafana provides OAuth2 integrations for the following auth providers:
If your OAuth2 provider is not listed, you can use Generic OAuth authentication.
This topic describes how to configure Generic OAuth authentication using different methods and includes examples of setting up Generic OAuth with specific OAuth2 providers.
To follow this guide:
sub claim.{{< admonition type="note" >}} If Users use the same email address in Entra ID that they use with other authentication providers (such as Grafana.com), you need to do additional configuration to ensure that the users are matched correctly. Please refer to the Using the same email address to login with different identity providers documentation for more information. {{< /admonition >}}
As a Grafana Admin, you can configure Generic OAuth client from within Grafana using the Generic OAuth UI. To do this, navigate to Administration > Authentication > Generic OAuth page and fill in the form. If you have a current configuration in the Grafana configuration file then the form will be pre-populated with those values otherwise the form will contain default values.
After you have filled in the form, click Save to save the configuration. If the save was successful, Grafana will apply the new configurations.
If you need to reset changes you made in the UI back to the default values, click Reset. After you have reset the changes, Grafana will apply the configuration from the Grafana configuration file (if there is any configuration) or the default values.
{{< admonition type="note" >}} If you run Grafana in high availability mode, configuration changes may not get applied to all Grafana instances immediately. You may need to wait a few minutes for the configuration to propagate to all Grafana instances. {{< /admonition >}}
Refer to configuration options for more information.
resource "grafana_sso_settings" "generic_sso_settings" {
provider_name = "generic_oauth"
oauth2_settings {
name = "Auth0"
auth_url = "https://<domain>/authorize"
token_url = "https://<domain>/oauth/token"
api_url = "https://<domain>/userinfo"
client_id = "<client id>"
client_secret = "<client secret>"
allow_sign_up = true
auto_login = false
scopes = "openid profile email offline_access"
use_pkce = true
use_refresh_token = true
}
}
Refer to Terraform Registry for a complete reference on using the grafana_sso_settings resource.
Ensure that you have access to the Grafana configuration file.
To integrate your OAuth2 provider with Grafana using our Generic OAuth authentication, follow these steps:
Create an OAuth2 application in your chosen OAuth2 provider.
Set the callback URL for your OAuth2 app to http://<my_grafana_server_name_or_ip>:<grafana_server_port>/login/generic_oauth.
Ensure that the callback URL is the complete HTTP address that you use to access Grafana via your browser, but with the appended path of /login/generic_oauth.
For the callback URL to be correct, it might be necessary to set the root_url option in the [server]section of the Grafana configuration file. For example, if you are serving Grafana behind a proxy.
Refer to the following table to update field values located in the [auth.generic_oauth] section of the Grafana configuration file:
| Field | Description |
|---|---|
client_id, client_secret | These values must match the client ID and client secret from your OAuth2 app. |
auth_url | The authorization endpoint of your OAuth2 provider. |
api_url | The user information endpoint of your OAuth2 provider. Information returned by this endpoint must be compatible with OpenID UserInfo. |
enabled | Enables Generic OAuth authentication. Set this value to true. |
Review the list of other Generic OAuth configuration options and complete them, as necessary.
Optional: Configure a refresh token:
a. Extend the scopes field of [auth.generic_oauth] section in Grafana configuration file with refresh token scope used by your OAuth2 provider.
b. Set use_refresh_token to true in [auth.generic_oauth] section in Grafana configuration file.
c. Enable the refresh token on the provider if required.
Optional: Configure team synchronization.
Restart Grafana.
You should now see a Generic OAuth login button on the login page and be able to log in or sign up with your OAuth2 provider.
Grafana can resolve a user's login from the OAuth2 ID token, user information retrieved from the OAuth2 UserInfo endpoint, or the OAuth2 access token. Grafana looks at these sources in the order listed until it finds a login. If no login is found, then the user's login is set to user's email address.
{{< admonition type="important" >}}
Email is required for successful sign-up and login with Generic OAuth. Even if you map login from another claim (for example sub), Grafana still requires the user to have an email. Ensure your provider returns an email claim or configure email_attribute_path so Grafana can resolve it. Including the email scope is strongly recommended (for OIDC providers use openid profile email).
{{< /admonition >}}
Refer to the following table for information on what to configure based on how your Oauth2 provider returns a user's login:
| Source of login | Required configuration |
|---|---|
login or username field of the OAuth2 ID token. | N/A |
| Another field of the OAuth2 ID token. | Set login_attribute_path configuration option. |
login or username field of the user information from the UserInfo endpoint. | N/A |
| Another field of the user information from the UserInfo endpoint. | Set login_attribute_path configuration option. |
login or username field of the OAuth2 access token. | N/A |
| Another field of the OAuth2 access token. | Set login_attribute_path configuration option. |
sub claim for loginMost of the OAuth2 providers expose a stable subject identifier in the sub claim. You can use it to populate the Grafana login by setting login_attribute_path to sub. Because email is still required, also make sure Grafana can resolve the user's email (for example by including the email scope or mapping a custom field via email_attribute_path).
Example configuration:
[auth.generic_oauth]
enabled = true
scopes = openid profile email
login_attribute_path = sub
# If your provider does not return `email` at the top level, map it explicitly
# email_attribute_path = user.email
Grafana can resolve a user's display name from the OAuth2 ID token, user information retrieved from the OAuth2 UserInfo endpoint, or the OAuth2 access token. Grafana looks at these sources in the order listed until it finds a display name. If no display name is found, then user's login is displayed instead.
Refer to the following table for information on what you need to configure depending on how your Oauth2 provider returns a user's name:
| Source of display name | Required configuration |
|---|---|
name or display_name field of the OAuth2 ID token. | N/A |
| Another field of the OAuth2 ID token. | Set name_attribute_path configuration option. |
name or display_name field of the user information from the UserInfo endpoint. | N/A |
| Another field of the user information from the UserInfo endpoint. | Set name_attribute_path configuration option. |
name or display_name field of the OAuth2 access token. | N/A |
| Another field of the OAuth2 access token. | Set name_attribute_path configuration option. |
Grafana can resolve the user's email address from the OAuth2 ID token, the user information retrieved from the OAuth2 UserInfo endpoint, the OAuth2 access token, or the OAuth2 /emails endpoint.
Grafana looks at these sources in the order listed until an email address is found.
If no email is found, then the email address of the user is set to an empty string.
Refer to the following table for information on what to configure based on how the Oauth2 provider returns a user's email address:
| Source of email address | Required configuration |
|---|---|
email field of the OAuth2 ID token. | N/A |
attributes map of the OAuth2 ID token. | Set email_attribute_name configuration option. By default, Grafana searches for email under email:primary key. |
upn field of the OAuth2 ID token. | N/A |
email field of the user information from the UserInfo endpoint. | N/A |
| Another field of the user information from the UserInfo endpoint. | Set email_attribute_path configuration option. |
email field of the OAuth2 access token. | N/A |
attributes map of the OAuth2 access token. | Set email_attribute_name configuration option. By default, Grafana searches for email under email:primary key. |
upn field of the OAuth2 access token. | N/A |
| Another field of the OAuth2 access token. | Set email_attribute_path configuration option. |
Email address marked as primary from the /emails endpoint of | |
the OAuth2 provider (obtained by appending /emails to the URL | |
configured with api_url) | N/A |
When a user logs in using an OAuth2 provider, Grafana verifies that the access token has not expired. When an access token expires, Grafana uses the provided refresh token (if any exists) to obtain a new access token.
Grafana uses a refresh token to obtain a new access token without requiring the user to log in again. If a refresh token doesn't exist, Grafana logs the user out of the system after the access token has expired.
To configure Generic OAuth to use a refresh token, set use_refresh_token configuration option to true and perform one or both of the following steps, if required:
scopes field of [auth.generic_oauth] section in Grafana configuration file with additional scopes.{{< admonition type="note" >}}
The accessTokenExpirationCheck feature toggle has been removed in Grafana v10.3.0 and the use_refresh_token configuration value will be used instead for configuring refresh token fetching and access token expiration check.
{{< /admonition >}}
By default, Grafana extracts user information from ID tokens without validating their cryptographic signatures. To enhance security, you can enable JWT signature validation to ensure that ID tokens are authentic and have not been tampered with.
To enable JWT ID token validation:
Set validate_id_token to true in the [auth.generic_oauth] section of the Grafana configuration file.
Configure jwk_set_url with the URL of your OAuth2 provider's JSON Web Key Set (JWKS) endpoint. This endpoint provides the public keys used to verify JWT signatures.
Common JWKS endpoint locations:
https://<provider-domain>/.well-known/jwks.jsonhttps://<tenant>.auth0.com/.well-known/jwks.jsonhttps://<keycloak-domain>/realms/<realm>/.well-known/openid-configuration (contains jwks_uri)Example configuration:
[auth.generic_oauth]
enabled = true
validate_id_token = true
jwk_set_url = https://your-provider.com/.well-known/jwks.json
client_id = <client id>
client_secret = <client secret>
auth_url = https://your-provider.com/authorize
token_url = https://your-provider.com/token
api_url = https://your-provider.com/userinfo
{{< admonition type="note" >}}
When JWT validation is enabled, Grafana caches the JWKS keys to improve performance. The cache respects the Cache-Control header from the JWKS endpoint response. If no cache expiration is specified, keys are cached for 5 minutes by default.
{{< /admonition >}}
{{< admonition type="caution" >}}
If validate_id_token is set to true, you must configure jwk_set_url. Authentication will fail if the JWK Set URL is not provided or if the ID token signature cannot be verified.
{{< /admonition >}}
Unless skip_org_role_sync option is enabled, the user's role will be set to the role retrieved from the auth provider upon user login.
The user's role is retrieved using a JMESPath expression from the role_attribute_path configuration option.
Grafana will first evaluate the expression using the OAuth2 ID token. If no role is found, the expression will be evaluated using the user information obtained from the UserInfo endpoint. If still no role is found, the expression will be evaluated using the OAuth2 access token.
To map the server administrator role, use the allow_assign_grafana_admin configuration option.
Refer to configuration options for more information.
If no valid role is found, the user is assigned the role specified by the auto_assign_org_role option.
You can disable this default role assignment by setting role_attribute_strict = true. This setting denies user access if no role or an invalid role is returned after evaluating the role_attribute_path and the org_mapping expressions.
You can use the org_attribute_path and org_mapping configuration options to assign the user to organizations and specify their role. For more information, refer to Org roles mapping example. If both org role mapping (org_mapping) and the regular role mapping (role_attribute_path) are specified, then the user will get the highest of the two mapped roles.
To ease configuration of a proper JMESPath expression, go to JMESPath to test and evaluate expressions with custom payloads.
{{< admonition type="note" >}}
When using org_attribute_path, the value returned by the JMESPath expression must be an array, not a string.
{{< /admonition >}}
This section includes examples of JMESPath expressions used for role mapping.
In this example, the user has been granted the role of an Editor. The role assigned is based on the value of the property role, which must be a valid Grafana role such as Admin, Editor, Viewer or None.
Payload:
{
...
"role": "Editor",
...
}
Config:
role_attribute_path = role
In the following more complex example, the user has been granted the Admin role. This is because they are a member of the admin group of their OAuth2 provider.
If the user was a member of the editor group, they would be granted the Editor role, otherwise Viewer.
Payload:
{
...
"groups": [
"engineer",
"admin",
],
...
}
Config:
role_attribute_path = contains(groups[*], 'admin') && 'Admin' || contains(groups[*], 'editor') && 'Editor' || 'Viewer'
In the following example, the user is granted the Grafana server administrator role.
Payload:
{
...
"roles": [
"admin",
],
...
}
Config:
role_attribute_path = contains(roles[*], 'admin') && 'GrafanaAdmin' || contains(roles[*], 'editor') && 'Editor' || 'Viewer'
allow_assign_grafana_admin = true
In this example, all users will be assigned Viewer role regardless of the user information received from the identity provider.
Config:
role_attribute_path = "'Viewer'"
skip_org_role_sync = false
In this example, the user has been granted the role of a Viewer in the org_foo org, and the role of an Editor in the org_bar and org_baz orgs.
If the user was a member of the admin group, they would be granted the Grafana server administrator role.
Payload:
{
"roles": ["org_foo", "org_bar", "another_org"]
}
Config:
role_attribute_path = contains(roles[*], 'admin') && 'GrafanaAdmin' || 'None'
allow_assign_grafana_admin = true
org_attribute_path = roles
org_mapping = org_foo:org_foo:Viewer org_bar:org_bar:Editor *:org_baz:Editor
{{< admonition type="note" >}} Available in Grafana Enterprise and to customers on select Grafana Cloud plans. For pricing information, visit pricing or contact our sales team. {{< /admonition >}}
By using Team Sync, you can link your OAuth2 groups to teams within Grafana. This will automatically assign users to the appropriate teams. Teams for each user are synchronized when the user logs in.
Generic OAuth groups can be referenced by group ID, such as 8bab1c86-8fba-33e5-2089-1d1c80ec267d or myteam.
Group information can be extracted from the OAuth2 ID token, user information from the UserInfo endpoint, or the OAuth2 access token.
For information on configuring OAuth2 groups with Grafana using the groups_attribute_path configuration option, refer to configuration options.
To learn more about Team Sync, refer to Configure team sync.
Configuration:
groups_attribute_path = groups
Payload:
{
...
"groups": [
"engineers",
"analysts",
],
...
}
The following table outlines the various Generic OAuth configuration options. You can apply these options as environment variables, similar to any other configuration within Grafana. For more information, refer to Override configuration with environment variables.
{{< admonition type="note" >}}
If the configuration option requires a JMESPath expression that includes a colon, enclose the entire expression in quotes to prevent parsing errors. For example role_attribute_path: "role:view"
{{< /admonition >}}
| Setting | Required | Supported on Cloud | Description | Default |
|---|---|---|---|---|
enabled | No | Yes | Enables Generic OAuth authentication. | false |
name | No | Yes | Name that refers to the Generic OAuth authentication from the Grafana user interface. | OAuth |
icon | No | Yes | Icon used for the Generic OAuth authentication in the Grafana user interface. | signin |
client_id | Yes | Yes | Client ID provided by your OAuth2 app. | |
client_secret | Yes | Yes | Client secret provided by your OAuth2 app. | |
auth_url | Yes | Yes | Authorization endpoint of your OAuth2 provider. | |
token_url | Yes | Yes | Endpoint used to obtain the OAuth2 access token. | |
api_url | Yes | Yes | Endpoint used to obtain user information compatible with OpenID UserInfo. | |
auth_style | No | Yes | Name of the OAuth2 AuthStyle to be used when ID token is requested from OAuth2 provider. It determines how client_id and client_secret are sent to Oauth2 provider. Available values are AutoDetect, InParams and InHeader. | AutoDetect |
scopes | No | Yes | List of comma- or space-separated OAuth2 scopes. | user:email |
empty_scopes | No | Yes | Set to true to use an empty scope during authentication. | false |
allow_sign_up | No | Yes | Controls Grafana user creation through the Generic OAuth login. Only existing Grafana users can log in with Generic OAuth if set to false. | true |
auto_login | No | Yes | Set to true to enable users to bypass the login screen and automatically log in. This setting is ignored if you configure multiple auth providers to use auto-login. | false |
login_prompt | No | Yes | Indicates the type of user interaction when the user logs in with the IdP. Available values are login, consent and select_account. | |
id_token_attribute_name | No | Yes | The name of the key used to extract the ID token from the returned OAuth2 token. | id_token |
login_attribute_path | No | Yes | JMESPath expression to use for user login lookup from the user ID token. For more information on how user login is retrieved, refer to Configure login. | |
name_attribute_path | No | Yes | JMESPath expression to use for user name lookup from the user ID token. This name will be used as the user's display name. For more information on how user display name is retrieved, refer to Configure display name. | |
email_attribute_path | No | Yes | JMESPath expression to use for user email lookup from the user information. For more information on how user email is retrieved, refer to Configure email address. | |
email_attribute_name | No | Yes | Name of the key to use for user email lookup within the attributes map of OAuth2 ID token. For more information on how user email is retrieved, refer to Configure email address. | email:primary |
role_attribute_path | No | Yes | JMESPath expression to use for Grafana role lookup. Grafana will first evaluate the expression using the OAuth2 ID token. If no role is found, the expression will be evaluated using the user information obtained from the UserInfo endpoint. If still no role is found, the expression will be evaluated using the OAuth2 access token. The result of the evaluation should be a valid Grafana role (None, Viewer, Editor, Admin or GrafanaAdmin). For more information on user role mapping, refer to Configure role mapping. | |
role_attribute_strict | No | Yes | Set to true to deny user login if the Grafana org role cannot be extracted using role_attribute_path or org_mapping. For more information on user role mapping, refer to Configure role mapping. | false |
skip_org_role_sync | No | Yes | Set to true to stop automatically syncing user roles. This will allow you to set organization roles for your users from within Grafana manually. | false |
org_attribute_path | No | No | JMESPath expression to use for Grafana org to role lookup. Grafana will first evaluate the expression using the OAuth2 ID token. If no value is returned, the expression will be evaluated using the user information obtained from the UserInfo endpoint. If still no value is returned, the expression will be evaluated using the OAuth2 access token. The result of the evaluation will be mapped to org roles based on org_mapping. For more information on org to role mapping, refer to Org roles mapping example. | |
org_mapping | No | No | List of comma- or space-separated <ExternalOrgName>:<OrgIdOrName>:<Role> mappings. Value can be * meaning "All users". Role is optional and can have the following values: None, Viewer, Editor or Admin. For more information on external organization to role mapping, refer to Org roles mapping example. | |
allow_assign_grafana_admin | No | No | Set to true to enable automatic sync of the Grafana server administrator role. If this option is set to true and the result of evaluating role_attribute_path for a user is GrafanaAdmin, Grafana grants the user the server administrator privileges and organization administrator role. If this option is set to false and the result of evaluating role_attribute_path for a user is GrafanaAdmin, Grafana grants the user only organization administrator role. For more information on user role mapping, refer to Configure role mapping. | false |
groups_attribute_path | No | Yes | JMESPath expression to use for user group lookup. Grafana will first evaluate the expression using the OAuth2 ID token. If no groups are found, the expression will be evaluated using the user information obtained from the UserInfo endpoint. If still no groups are found, the expression will be evaluated using the OAuth2 access token. The result of the evaluation should be a string array of groups. | |
allowed_groups | No | Yes | List of comma- or space-separated groups. The user should be a member of at least one group to log in. If you configure allowed_groups, you must also configure groups_attribute_path. | |
allowed_organizations | No | Yes | List of comma- or space-separated organizations. The user should be a member of at least one organization to log in. | |
allowed_domains | No | Yes | List of comma- or space-separated domains. The user should belong to at least one domain to log in. | |
team_ids | No | Yes | String list of team IDs. If set, the user must be a member of one of the given teams to log in. If you configure team_ids, you must also configure teams_url and team_ids_attribute_path. | |
team_ids_attribute_path | No | Yes | The JMESPath expression to use for Grafana team ID lookup within the results returned by the teams_url endpoint. | |
teams_url | No | Yes | The URL used to query for team IDs. If not set, the default value is /teams. If you configure teams_url, you must also configure team_ids_attribute_path. | |
tls_skip_verify_insecure | No | No | If set to true, the client accepts any certificate presented by the server and any host name in that certificate. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks. | false |
tls_client_cert | No | No | The path to the certificate. | |
tls_client_key | No | No | The path to the key. | |
tls_client_ca | No | No | The path to the trusted certificate authority list. | |
use_pkce | No | Yes | Set to true to use Proof Key for Code Exchange (PKCE). Grafana uses the SHA256 based S256 challenge method and a 128 bytes (base64url encoded) code verifier. | false |
use_refresh_token | No | Yes | Set to true to use refresh token and check access token expiration. | false |
validate_id_token | No | Yes | Set to true to enable JWT signature validation for ID tokens. When enabled, jwk_set_url must be configured. | false |
jwk_set_url | No | Yes | URL of the JSON Web Key Set (JWKS) endpoint used to verify JWT ID token signatures. Required when validate_id_token is set to true. | |
signout_redirect_url | No | Yes | URL to redirect to after the user logs out. |
This section includes examples of setting up Generic OAuth integration.
To set up Generic OAuth authentication with Descope, follow these steps:
Create a Descope Project here, and go through the Getting Started Wizard to configure your authentication. You can skip step if you already have Descope project set up.
If you wish to use a flow besides Sign Up or In, go to the IdP Applications menu in the console, and select your IdP application. Then alter the Flow Hosting URL query parameter ?flow=sign-up-or-in to change which flow id you wish to use.
Click Save.
Update the [auth.generic_oauth] section of the Grafana configuration file using the values from the Settings tab:
{{< admonition type="note" >}} You can get your Client ID (Descope Project ID) under Project Settings. Your Client Secret (Descope Access Key) can be generated under Access Keys. {{< /admonition >}}
[auth.generic_oauth]
enabled = true
allow_sign_up = true
auto_login = false
team_ids =
allowed_organizations =
name = Descope
client_id = <Descope Project ID>
client_secret = <Descope Access Key>
scopes = openid profile email descope.claims descope.custom_claims
auth_url = https://api.descope.com/oauth2/v1/authorize
token_url = https://api.descope.com/oauth2/v1/token
api_url = https://api.descope.com/oauth2/v1/userinfo
use_pkce = true
use_refresh_token = true
{{< admonition type="note" >}} Support for the Auth0 "audience" feature is not currently available in Grafana. For roles and permissions, the available options are described here. {{< /admonition >}}
To set up Generic OAuth authentication with Auth0, follow these steps:
Create an Auth0 application using the following parameters:
Go to the Settings tab of the application and set Allowed Callback URLs to https://<grafana domain>/login/generic_oauth.
Click Save Changes.
Update the [auth.generic_oauth] section of the Grafana configuration file using the values from the Settings tab:
[auth.generic_oauth]
enabled = true
allow_sign_up = true
auto_login = false
team_ids =
allowed_organizations =
name = Auth0
client_id = <client id>
client_secret = <client secret>
scopes = openid profile email offline_access
auth_url = https://<domain>/authorize
token_url = https://<domain>/oauth/token
api_url = https://<domain>/userinfo
use_pkce = true
use_refresh_token = true
To set up Generic OAuth authentication with Bitbucket, follow these steps:
Navigate to Settings > Workspace setting > OAuth consumers in BitBucket.
Create an application by selecting Add consumer and using the following parameters:
https://<grafana domain>/login/generic_oauthClick Save.
Update the [auth.generic_oauth] section of the Grafana configuration file using the values from the Key and Secret from the consumer description:
[auth.generic_oauth]
name = BitBucket
enabled = true
allow_sign_up = true
auto_login = false
client_id = <client key>
client_secret = <client secret>
scopes = account email
auth_url = https://bitbucket.org/site/oauth2/authorize
token_url = https://bitbucket.org/site/oauth2/access_token
api_url = https://api.bitbucket.org/2.0/user
teams_url = https://api.bitbucket.org/2.0/user/permissions/workspaces
team_ids_attribute_path = values[*].workspace.slug
team_ids =
allowed_organizations =
use_refresh_token = true
By default, a refresh token is included in the response for the Authorization Code Grant.
To set up Generic OAuth authentication with OneLogin, follow these steps:
Create a new Custom Connector in OneLogin with the following settings:
https://<grafana domain>/login/generic_oauthhttps://<grafana domain>/login/generic_oauthAdd an app to the Grafana Connector:
Update the [auth.generic_oauth] section of the Grafana configuration file using the client ID and client secret from the SSO tab of the app details page:
Your OneLogin Domain will match the URL you use to access OneLogin.
[auth.generic_oauth]
name = OneLogin
enabled = true
allow_sign_up = true
auto_login = false
client_id = <client id>
client_secret = <client secret>
scopes = openid email name
auth_url = https://<onelogin domain>.onelogin.com/oidc/2/auth
token_url = https://<onelogin domain>.onelogin.com/oidc/2/token
api_url = https://<onelogin domain>.onelogin.com/oidc/2/me
team_ids =
allowed_organizations =
To set up Generic OAuth authentication with Dex IdP, follow these steps:
Add Grafana as a client in the Dex config YAML file:
staticClients:
- id: <client id>
name: Grafana
secret: <client secret>
redirectURIs:
- 'https://<grafana domain>/login/generic_oauth'
{{< admonition type="note" >}}
Unlike many other OAuth2 providers, Dex doesn't provide <client secret>.
Instead, a secret can be generated with for example openssl rand -hex 20.
{{< /admonition >}}
Update the [auth.generic_oauth] section of the Grafana configuration:
[auth.generic_oauth]
name = Dex
enabled = true
client_id = <client id>
client_secret = <client secret>
scopes = openid email profile groups offline_access
auth_url = https://<dex base uri>/auth
token_url = https://<dex base uri>/token
api_url = https://<dex base uri>/userinfo
<dex base uri> corresponds to the issuer: configuration in Dex (e.g. the Dex
domain possibly including a path such as e.g. /dex). The offline_access scope is
needed when using refresh tokens.