apps/docs/content/apis/openidoauth/authrequest.mdx
import { ExternalLink } from "lucide-react";
The OIDC Playground is for testing OpenID Authentication Requests, giving you more insight how OpenID Connect works and how you can customize ZITADEL behavior with different parameters.
An OpenID Connect (OIDC) authentication request is an OAuth 2.0 Authorization Request using additional parameters and scopes to request that the end-user be authenticated by ZITADEL.
<a href="https://zitadel.com/playgrounds/oidc" target="_blank" className="flex items-center gap-2 text-primary hover:underline"> Go to the OIDC Playground <ExternalLink className="h-4 w-4" /> </a>Currently, ZITADEL requires human users to authenticate through the hosted login page. Your application should initiate a login by issuing an authentication request and redirecting the user to the login page. You can customize the behavior of ZITADEL by providing additional parameters and scopes in the request.
This playground should help you to initially craft an authentication request and to explore the behavior of ZITADEL in more depth.
Not all request parameters are available in the playground. Please refer to the full documentation of the authorization endpoint.
The <span className="text-yellow-500">Custom Domain</span> to your ZITADEL instance. Use the base-path, the playground will add the required path to the request.
More in the <a href="/apis/openidoauth/endpoints#required-request-parameters">documentation</a> about required Parameters.
Depending on the authentication and authorization flow of your application you might need to append some information to the authentication request.
<span className="text-teal-600">Authentication method</span> "(none) PKCE" is recommended for most application types. The playground appends automatically a code challenge for PKCE flows.
You need to append a "Code Challenge" by providing a random <span className="text-teal-600">Code Verifier</span> that is being hashed and encoded in the request to the token endpoint, please see our guide for more details.
More in the documentation about authentication methods.
There are many more additional parameters. Please refer to the documentation about additional parameters.
Used to request additional information from ZITADEL.
These scopes are defined in the OpenID Connect specification.
The openid scope is mandatory.
Not all scopes are available in the playground. Please refer to the full documentation for the exhaustive list of available standard and reserved scopes.
You can request additional information that is specific to ZITADEL or customize the behavior of ZITADEL by including reserved scopes. Please refer to the documentation for a full list of available reserved scopes.
Enforce an organization's policies and branding as well as membership of the user by passing the scope urn:zitadel:iam:org:id:{id} with the required <span className="text-purple-500">Organization ID</span>.
Please refer to the full guide on branding.
Pass the scope urn:zitadel:iam:user:metadata to request a user's metadata.
Please refer to the full guide on user-metadata for further details.
Calling the core API with the authenticated user, requires that the projectID of ZITADEL is included in the audience claim.
This can be achieved by adding the scope urn:zitadel:iam:org:project:id:zitadel:aud to your applications authorization request.
Please refer to our guide on how to login users.
OpenID Connect certified libraries should allow you to customize the parameters and define scopes for the authorization request. You can also continue by using one of our example applications.