🔑 OIDC via FusionAuth
Learn how to connect OIDC FusionAuth to tchop's user management and backend.
This how-to guide explains how to connect OIDC FusionAuth to tchop user management and backend. It covers creation of an OIDC connection, a key master, a tenant, a new application, and the required fields for the tchop side.
The guide also includes an example of a configuration file.
Creating OIDC connection
Create Key Master (optional, skip if you already have one)

Open
Settings
/Key Master
Click
Generate RSA key pair
set
Algorithm
asRS256
set
Issuer
astchop.io
Create Tenant (optional, skip if your user dataset already exist)
General Tab

JWT tab

Create new application
(optional) select previous created tenant (
tchop.io
)
Auth tab

set
Client Authentication
asNot required when using PKCE
set
PKCE
asRequired
disable
Generate refresh tokens
set
URL validation
asAllow wildcards
set
Authorized redirect URLs
Please add redirect URLs here based on the App package name (info to be provided by tchop)
set
Enabled grants
asAuthorization Code
only
JWT tab

enable
The settings
set
Access token signing key
astchop.io
(select previous created keyset)set
Id token signing key
astchop.io
(select previous created keyset)
Required fields for tchop side
Fields | Description | Example Value |
---|---|---|
jwksUri | value from | http://localhost:9011/.well-known/jwks.json |
issuer | name of tenant which created before or | acme.com |
algorithm | type from Master key section, eg RS258 | RS256 |
audience | same as | acme.com |
tokenEndpoint | value from | http://localhost:9011/oauth2/token |
authorizationEndpoint | value from | http://localhost:9011/oauth2/authorize |
userinfoEndpoint | value from | http://localhost:9011/oauth2/userinfo |
clientId | Id of created application, value from | 19fe3351-1e6e-4eef-914d-c74e8ebcb010 |