Interface: OIDCConfig<P>
providers.OIDCConfig
TODO:
Type parametersβ
Name |
---|
P |
Hierarchyβ
Omit
<OAuth2Config
<P
>,"type"
>β³
OIDCConfig
Propertiesβ
idβ
β’ id: string
Identifies the provider when you want to sign in to a specific provider.
Example
signIn('github') // "github" is the provider ID
Inherited fromβ
Omit.id
nameβ
β’ name: string
The name of the provider. shown on the default sign in page.
Inherited fromβ
Omit.name
allowDangerousEmailAccountLinkingβ
β’ Optional
allowDangerousEmailAccountLinking: boolean
Inherited fromβ
Omit.allowDangerousEmailAccountLinking
authorizationβ
β’ Optional
authorization: string
| AuthorizationEndpointHandler
The login process will be initiated by sending the user to this URL.
Inherited fromβ
Omit.authorization
checksβ
β’ Optional
checks: ChecksType
[]
The CSRF protection performed on the callback endpoint.
Defaults to ["pkce"]
if undefined.
RFC 7636 - Proof Key for Code Exchange by OAuth Public Clients (PKCE) | RFC 6749 - The OAuth 2.0 Authorization Framework | OpenID Connect Core 1.0 |
Inherited fromβ
Omit.checks
profileβ
β’ Optional
profile: ProfileCallback
<P
>
Receives the profile object returned by the OAuth provider, and returns the user object.
This will be used to create the user in the database.
Defaults to: id
, email
, name
, image
Inherited fromβ
Omit.profile
wellKnownβ
β’ Optional
wellKnown: string
OpenID Connect (OIDC) compliant providers can configure
this instead of authorize
/token
/userinfo
options
without further configuration needed in most cases.
You can still use the authorize
/token
/userinfo
options for advanced control.
Inherited fromβ
Omit.wellKnown