This guide explains how to configure your OAuth 2.0 / OpenID Connect (OIDC) provider so it works with Nudj. This method is suitable for scenarios where users arrive directly at Nudj (not authenticated) and press ‘log in’.
Quick Start
1
Verify Authentication Method
Ensure users will arrive directly at Nudj not authenticated and log in there. If users are already authenticated elsewhere, use API Link User Token Authentication instead.
2
Add OIDC Configuration in Nudj
Navigate to Organisation Settings → Authentication in the admin panel and add your OAuth provider details:
- issuer (OIDC base URL)
- clientId
- clientSecret
- Required scopes:
openid
,profile
,email
(optional:offline_access
)
oidcConfig.id
.3
Whitelist Nudj's Redirect URI
Add the Nudj redirect URI in your OAuth/OIDC provider (exact match, no trailing slash):Find
${rootDomain}
in Organisation Settings → Domains in the admin panel.Ask Nudj support to provide ${oidcConfig.id}
.4
Test Integration
Save changes in your OAuth provider and test login in your Nudj environment.
When to Use This Method
Use OAuth Method
- Users arrive directly at Nudj not authenticated
- Users initiate login from Nudj interface
- Standard authorization flow required
- Redirects to your login system acceptable
Use API Link Instead
- Users already authenticated elsewhere
- Seamless session continuation needed
- No login screen should be shown
- Direct JWT-based authentication preferred
Related Authentication Methods
→ API Link User Token Auth
Alternative Method: For users already authenticated elsewhere who need seamless session continuation
→ Enterprise SSO Overview
Overview: Complete guide to all enterprise authentication options and patterns
→ Integration Overview
Next Steps: Understand access patterns and reward delivery after authentication setup