Overview
TokenIDP provides multi-tenant identity, application registration, token issuance, user management, and operational controls in one platform.
Audience: Developers, CTOs, Marketing
Read this page when you need a concise explanation of the product and its deployment role.
Core Concepts
- Tenant: the isolation boundary for configuration, applications, users, roles, and keys
- Application (Client): the OAuth or OIDC client registered to request tokens
- User: the authenticated subject
- Role: a grouping of permissions used by admin and business policies
- Scope: a delegated permission requested during authorization
- Resource: the API or service protected by the issued token
- Signing Key: the private key or certificate that signs tokens
- JWKS: the published public keys used for verification
- Issuer: the canonical URL that identifies the TokenIDP instance
How TokenIDP Fits
TokenIDP sits between Applications and protected APIs:
- Applications redirect users to TokenIDP or authenticate directly with allowed grants.
- TokenIDP validates the request in Tenant context.
- TokenIDP issues tokens signed by the current Signing Key.
- APIs validate the token against the Issuer and JWKS.
Working Example
SPA -> /authorize -> TokenIDP login -> /token -> Access Token -> API -> JWKS validation
Common Pitfalls
- Mixing user authentication concerns with API authorization concerns.
- Treating Tenant configuration as globally shared across all customers.
Troubleshooting Tips
- If teams disagree on where a setting belongs, ask whether it is Tenant-specific, Application-specific, or runtime-host specific.