Skip to main content
This guide explains how to configure your OAuth 2.0 / OpenID Connect (OIDC) provider so it works with Nudj. This method is suitable for scenarios where users arrive directly at Nudj (not authenticated) and press ‘log in’.

Quick Start

1

Verify Authentication Method

Ensure users will arrive directly at Nudj not authenticated and log in there. If users are already authenticated elsewhere, use API Link User Token Authentication instead.
2

Add OIDC Configuration in Nudj

Navigate to Organisation Settings → Authentication in the admin panel and add your OAuth provider details:
  • issuer (OIDC base URL)
  • clientId
  • clientSecret
  • Required scopes: openid, profile, email (optional: offline_access)
Save the configuration — Nudj will generate your oidcConfig.id.
3

Whitelist Nudj's Redirect URI

Add the Nudj redirect URI in your OAuth/OIDC provider (exact match, no trailing slash):
https://${rootDomain}/api/auth/callback/organisation-oidc-${oidcConfig.id}
Find ${rootDomain} in Organisation Settings → Domains in the admin panel.Ask Nudj support to provide ${oidcConfig.id}.
4

Test Integration

Save changes in your OAuth provider and test login in your Nudj environment.

When to Use This Method

Use OAuth Method

  • Users arrive directly at Nudj not authenticated
  • Users initiate login from Nudj interface
  • Standard authorization flow required
  • Redirects to your login system acceptable

Use API Link Instead

  • Users already authenticated elsewhere
  • Seamless session continuation needed
  • No login screen should be shown
  • Direct JWT-based authentication preferred
I