OpenID Connect Provider Integration
This guide explains how to connect any OpenID Connect provider (OP) to the SIROS ID issuer for credential issuance. After reading this guide, you will understand how to:
- Configure OIDC authentication for the issuer
- Register the issuer as an OIDC client
- Map OIDC claims to credential claims
- Use dynamic client registration
Overview
OpenID Connect is the recommended integration method for most identity providers. Users authenticate through their existing OIDC provider, and the issuer uses the identity claims to construct digital credentials via OID4VCI.
Use OIDC integration when:
- Your identity provider supports OpenID Connect
- You want the simplest integration path
- You need modern features like PKCE and dynamic registration
Prerequisites
- An OpenID Connect compliant identity provider
- Admin access to register OIDC clients (or OP supports dynamic registration)
- A SIROS ID issuer (hosted or self-hosted) with OIDC RP configured (
apigw.oidcrpsection)
Integration Mode
OIDC authentication is integrated into the standard OpenID4VCI credential issuance pipeline. When a credential_constructor entry has auth_method: oidc, the OID4VCI consent step redirects the user to the OIDC Provider. After successful authentication, the ID token claims are transformed into credential claims via the credential_mappings configuration, and the standard OID4VCI token/credential flow continues.
This means OIDC-authenticated credentials benefit from the same DPoP binding, token lifecycle, and wallet protocol support as every other auth method.
The credential_mappings key under apigw.oidcrp must match the credential_constructor key for the credential type. For example, if the constructor key is pid, the mapping key must also be pid.
Configuration
OIDC Relying Party authentication is configured in the `apigw.oidcrp` section.
Basic Configuration
apigw:
oidcrp:
# Enable OIDC RP support
enabled: true
# OAuth2 client credentials
client_id: "your-client-id"
client_secret: "your-client-secret"
# Callback URL for authorization responses
redirect_uri: "https://issuer.example.org/oidcrp/callback"
# OIDC Provider issuer URL (for discovery)
issuer_url: "https://accounts.google.com"
# Scopes to request
scopes:
- openid
- profile
- email
# Session duration in seconds (default: 3600)
session_duration: 3600
# Credential mappings
credential_mappings:
pid:
credential_config_id: "urn:eudi:pid:arf-1.8:1"
attributes:
given_name:
claim: "given_name"
required: true
family_name:
claim: "family_name"
required: true
Dynamic Client Registration
For OIDC Providers supporting RFC 7591:
apigw:
oidcrp:
enabled: true
redirect_uri: "https://issuer.example.org/oidcrp/callback"
issuer_url: "https://op.example.org"
# Dynamic registration (instead of static client_id/client_secret)
dynamic_registration:
enabled: true
# Optional: initial access token if required by OP
initial_access_token: "your-registration-token"
# Optional: persist registered credentials
storage_path: "/var/lib/vc/oidcrp-registration.json"
scopes:
- openid
- profile
- email
# Optional client metadata for registration
client_name: "SIROS ID Credential Issuer"
client_uri: "https://issuer.example.org"
logo_uri: "https://issuer.example.org/logo.png"
contacts:
- "admin@example.org"
credential_mappings:
# ...
Claim Mapping
Standard OIDC Claims
OpenID Connect defines standard claims:
| OIDC Claim | Description |
|---|---|
| `sub` | Subject identifier |
| `given_name` | First name |
| `family_name` | Last name |
| `email` | Email address |
| `email_verified` | Email verification status |
| `birthdate` | Birth date (YYYY-MM-DD) |
| `address` | Address object |
| `phone_number` | Phone number |
Credential Mappings Configuration
apigw:
oidcrp:
enabled: true
issuer_url: "https://accounts.google.com"
client_id: "${OIDC_CLIENT_ID}"
client_secret: "${OIDC_CLIENT_SECRET}"
redirect_uri: "https://issuer.example.org/oidcrp/callback"
scopes:
- openid
- profile
- email
credential_mappings:
# Key matches credential_constructor scope
pid:
# OpenID4VCI credential configuration ID
credential_config_id: "urn:eudi:pid:arf-1.8:1"
# Attribute mappings: OIDC claim -> credential claim
attributes:
# Direct claim mapping
given_name:
claim: "given_name"
required: true
family_name:
claim: "family_name"
required: true
email:
claim: "email"
required: false
# Subject identifier with transformation
sub:
claim: "personal_id"
required: true
transform: "lowercase"
# Claim with default value
locale:
claim: "locale"
required: false
default: "en-US"
# Example: diploma credential
diploma:
credential_config_id: "urn:eudi:diploma:1"
attributes:
given_name:
claim: "student_first_name"
required: true
# ...
Attribute Configuration Options
| Option | Type | Description |
|---|---|---|
| `claim` | string | Target credential claim name (supports dot-notation) |
| `required` | boolean | Whether the OIDC claim must be present |
| `transform` | string | Optional: `lowercase`, `uppercase`, `trim` |
| `default` | string | Default value if claim is missing |
Provider-Specific Examples
Google
apigw:
oidcrp:
enabled: true
issuer_url: "https://accounts.google.com"
client_id: "${GOOGLE_CLIENT_ID}"
client_secret: "${GOOGLE_CLIENT_SECRET}"
redirect_uri: "https://issuer.example.org/oidcrp/callback"
scopes:
- openid
- profile
- email
credential_mappings:
pid:
credential_config_id: "urn:eudi:pid:arf-1.8:1"
attributes:
given_name:
claim: "given_name"
required: true
family_name:
claim: "family_name"
required: true
email:
claim: "email"
required: true
Azure AD / Microsoft Entra ID
apigw:
oidcrp:
enabled: true
issuer_url: "https://login.microsoftonline.com/{tenant-id}/v2.0"
client_id: "${AZURE_CLIENT_ID}"
client_secret: "${AZURE_CLIENT_SECRET}"
redirect_uri: "https://issuer.example.org/oidcrp/callback"
scopes:
- openid
- profile
- email
- User.Read
credential_mappings:
# ...
Keycloak
apigw:
oidcrp:
enabled: true
issuer_url: "https://keycloak.example.org/realms/myrealm"
client_id: "${KEYCLOAK_CLIENT_ID}"
client_secret: "${KEYCLOAK_CLIENT_SECRET}"
redirect_uri: "https://issuer.example.org/oidcrp/callback"
scopes:
- openid
- profile
- email
credential_mappings:
# ...
Auth0
apigw:
oidcrp:
enabled: true
issuer_url: "https://{your-domain}.auth0.com/"
client_id: "${AUTH0_CLIENT_ID}"
client_secret: "${AUTH0_CLIENT_SECRET}"
redirect_uri: "https://issuer.example.org/oidcrp/callback"
scopes:
- openid
- profile
- email
credential_mappings:
# ...
Docker Deployment
services:
apigw:
image: ghcr.io/sirosfoundation/vc-apigw:latest
restart: always
ports:
- "8080:8080"
environment:
- OIDC_CLIENT_ID=${OIDC_CLIENT_ID}
- OIDC_CLIENT_SECRET=${OIDC_CLIENT_SECRET}
volumes:
- ./config.yaml:/config.yaml:ro
- ./pki:/pki:ro
depends_on:
- mongo
- issuer
issuer:
image: ghcr.io/sirosfoundation/vc-issuer:latest
# ...
mongo:
image: mongo:7
volumes:
- mongo-data:/data/db
volumes:
mongo-data:
Complete Configuration Example
apigw:
external_server_url: "https://issuer.example.org"
oidcrp:
enabled: true
client_id: "${OIDC_CLIENT_ID}"
client_secret: "${OIDC_CLIENT_SECRET}"
redirect_uri: "https://issuer.example.org/oidcrp/callback"
issuer_url: "https://accounts.google.com"
scopes:
- openid
- profile
- email
session_duration: 3600
credential_mappings:
pid:
credential_config_id: "urn:eudi:pid:arf-1.8:1"
attributes:
given_name:
claim: "given_name"
required: true
family_name:
claim: "family_name"
required: true
email:
claim: "email"
required: true
sub:
claim: "subject_id"
required: true
# Credential constructor must match credential_mappings keys
# auth_method: oidc triggers the OIDC redirect during OID4VCI consent
credential_constructor:
pid:
vct: "urn:eudi:pid:arf-1.8:1"
vctm_file_path: "/metadata/vctm_pid_arf_1_8.json"
auth_method: oidc
format: "dc+sd-jwt"
common:
mongo:
uri: mongodb://mongo:27017
Troubleshooting
Invalid Client
Solutions:
- Verify `client_id` and `client_secret` are correct
- Ensure the client is not expired or disabled at the OP
- Check redirect URI exactly matches what's registered
Claims Missing
Solutions:
- Verify scopes include the claims you need
- Some claims require explicit consent or additional scopes
- Check OP documentation for claim availability
Token Signature Verification Failed
Solutions:
- Verify `issuer_url` matches the token's `iss` claim
- Check JWKS endpoint is accessible from your issuer
- Ensure server time is synchronized
Next Steps
- Issuer Configuration – Full issuer documentation
- SAML IdP Integration – Use SAML instead of OIDC
- Trust Services – Configure trust framework integration