Openid Connect Server Blueprint

OAuth 2.0 and OpenID Connect identity provider with token issuance

   
Feature openid-connect-server
Category Auth
Version 1.0.0
Tags oauth2, oidc
YAML Source View on GitHub
JSON API openid-connect-server.json

Fields

Name Type Required Label Description
client_id text Yes Client ID Validations: required
scope text Yes Scopes Validations: required
redirect_uri url Yes Redirect URI Validations: required, url

Rules

  • core: OIDC protocol compliance

Outcomes

Invalid_client (Priority: 1) — Error: INVALID_CLIENT

Given:

  • client_id neq registered

Then:

  • emit_event event: oidc.invalid_client

Result: Invalid client

Authorization_success (Priority: 5)

Given:

  • client_id exists null

Then:

  • emit_event event: oidc.authorized

Result: Authorization code issued

Errors

Code Status Message Retry
INVALID_CLIENT 401 Client not found No

Events

Event Description Payload
oidc.authorized OIDC authorization success client_id
oidc.invalid_client Invalid client error client_id

AGI Readiness

Goals

Reliable Openid Connect Server

OAuth 2.0 and OpenID Connect identity provider with token issuance

Success Metrics:

Metric Target Measurement
unauthorized_access_rate 0% Failed authorization attempts that succeed
response_time_p95 < 500ms 95th percentile response time

Constraints:

  • security (non-negotiable): Follow OWASP security recommendations

Autonomy

Level: supervised

Human Checkpoints:

  • before making irreversible changes

Escalation Triggers:

  • error_rate > 5
  • consecutive_failures > 3

Verification

Invariants:

  • error messages never expose internal system details

Tradeoffs

Prefer Over Reason
security performance authentication must prioritize preventing unauthorized access

Safety

Action Permission Cooldown Max Auto
authorization_success autonomous - -
invalid_client autonomous - -
Extensions (framework-specific hints) ```yaml source: repo: https://github.com/keycloak/keycloak project: Keycloak tech_stack: Java ```