Generic OIDC Provider#
A checklist for connecting NMP to any OIDC-compliant identity provider not covered by the Azure AD page.
Prerequisites: Familiarity with OIDC Setup.
Provider Checklist#
Verify your IdP meets these requirements:
Supports OpenID Connect (not just OAuth2)
Exposes a
.well-known/openid-configurationdiscovery documentSupports the device authorization grant (required for
nmp auth login)Allows creating custom API scopes (
platform:read,platform:write)Includes email (or equivalent claim) in access tokens
Supports JWKS for token signature validation
Configuration Template#
auth:
enabled: true
oidc:
enabled: true
issuer: "<your-idp-issuer-url>"
client_id: "<your-client-id>"
# Uncomment and adjust if your IdP uses non-standard claim names:
# email_claim: "email"
# subject_claim: "sub"
# groups_claim: "groups"
# Uncomment if your IdP prefixes scopes:
# scope_prefix: "<prefix>/"
default_scopes: "openid profile email offline_access platform:read platform:write"
Claim Mapping Reference#
IdP |
Email Claim |
Subject Claim |
Groups Claim |
|---|---|---|---|
Azure AD |
|
|
|
Okta |
|
|
|
Keycloak |
|
|
|
Auth0 |
|
|
custom |
Google Workspace |
|
|
N/A |
Generic OIDC |
|
|
|