Key concepts

This section provides foundational knowledge required to successfully integrate with the Corppass Authorization API. It introduces the core standards, security mechanisms, and token structures that underpin Corppass’s authentication and authorization flows.

Understanding these concepts is critical for implementing secure, standards-compliant interactions between Relying Parties (RPs) and Corppass, and ensures alignment with the OpenID Connect (OIDC) and OAuth 2.0 protocols.

What This Section Covers

Standards and Specifications Reference

For developers who are interested in the underlying standards Corppass adheres to

Reference
Summary

Defines the core protocol for identity authentication built on top of OAuth 2.0. Covers ID tokens, user authentication flows, and UserInfo endpoints.

High-level overview of OpenID Connect and its role in identity federation and SSO. Ideal starting point for newcomers.

Defines the structure of JWTs — compact, URL-safe tokens used for conveying claims securely between parties.

Describes how to digitally sign content (like JWTs) to ensure integrity and authenticity. Used in ID/access tokens.

Describes how to encrypt content (like ID tokens) to protect confidentiality. Used when issuing encrypted ID tokens.

An extension to OAuth 2.0 that adds security to public clients by mitigating code interception attacks.

Specifies how clients can use signed JWTs to authenticate to the token endpoint — used in Client Assertion JWT.

Defines a proof-of-possession mechanism for OAuth 2.0 to bind access tokens to a public key. Used to prevent token replay and enforce sender-constrained access. RPs must generate and sign a DPoP proof JWT with every protected API request.

Specifies a high-security profile for OpenID and OAuth APIs. Includes requirements for DPoP, JWS-request objects, client authentication, and error handling best practices.

Defines how JSON structures are validated — used to describe token claims, payloads, or configuration metadata.

Last updated