Appearance
Engagifii Identity API Documentation
Table of Contents
Project Overview
The Engagifii Identity API is a comprehensive OAuth 2.0 and OpenID Connect authentication service that provides centralized identity management and single sign-on (SSO) capabilities for the Engagifii platform. Built on industry-standard protocols, this service enables secure authentication and authorization for both internal microservices and external applications.
Core Capabilities
- OAuth 2.0 Authentication: Industry-standard authorization framework supporting multiple grant types
- OpenID Connect (OIDC): Identity layer on top of OAuth 2.0 for authentication
- Single Sign-On (SSO): Seamless authentication across all Engagifii services
- Multi-tenant Support: Secure tenant isolation with organization-specific configurations
- Token Management: JWT-based access and refresh token lifecycle management
- User Management: Comprehensive user profile and permission management
- Session Management: Secure session handling with logout capabilities
- External Integration: Support for third-party application authentication
Key Features
- Standard Protocols: Full OAuth 2.0 and OpenID Connect compliance
- Multiple Grant Types: Support for Authorization Code, Client Credentials, and Refresh Token flows
- JWT Tokens: Self-contained, cryptographically signed tokens
- PKCE Support: Enhanced security for public clients
- Token Introspection: Validate and inspect token claims
- Discovery Endpoint: Auto-configuration for OpenID Connect clients
- Customizable Scopes: Fine-grained permission control
Quick Start Guide
Get up and running with the Engagifii Identity API in under 5 minutes:
1. Get Your Credentials
Contact your system administrator to obtain:
- Client ID: Your application identifier
- Client Secret: Your application secret key (for confidential clients)
- Redirect URI: Your application's callback URL (for authorization code flow)
2. Authorization Code Flow (For Web Applications)
bash
# Step 1: Redirect user to authorization endpoint
https://engagifii-identity-live.azurewebsites.net/connect/authorize?
client_id=YOUR_CLIENT_ID&
scope=openid profile email&
redirect_uri=YOUR_REDIRECT_URI&
response_type=code
# Step 2: Exchange authorization code for tokens
curl -X POST "https://engagifii-identity-live.azurewebsites.net/connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=authorization_code&code=AUTH_CODE&redirect_uri=YOUR_REDIRECT_URI&client_id=YOUR_CLIENT_ID&client_secret=YOUR_CLIENT_SECRET"3. Client Credentials Flow (For Service-to-Service)
bash
# Get an access token for service communication
curl -X POST "https://engagifii-identity-live.azurewebsites.net/connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=client_credentials&client_id=YOUR_CLIENT_ID&client_secret=YOUR_CLIENT_SECRET&scope=api"4. Next Steps
- Read the Getting Started Guide for detailed setup instructions
- Explore the API Reference for complete endpoint documentation
- Check out Integration Examples for code samples
Base URLs
| Environment | Base URL | Description |
|---|---|---|
| Production | https://engagifii-identity-live.azurewebsites.net | Live production environment |
| QA/Staging | https://engagifii-qa-identity.azurewebsites.net | Pre-production testing |
| Development | https://engagifii-dev-identity.azurewebsites.net | Development and integration testing |
Note: All OAuth/OIDC endpoints follow standard paths (e.g.,
/connect/authorize,/connect/token).
API Versioning
The Engagifii Identity API follows OAuth 2.0 and OpenID Connect specifications:
Current Implementation
- OAuth 2.0: RFC 6749 compliant
- OpenID Connect: Core 1.0 specification
- Status: Stable and fully supported
- Discovery:
/.well-known/openid-configuration
Standard Endpoints
Authorization: /connect/authorize
Token: /connect/token
UserInfo: /connect/userinfo
Discovery: /.well-known/openid-configuration
JWKS: /.well-known/openid-configuration/jwks
Introspection: /connect/introspect
Revocation: /connect/revocation
End Session: /connect/endsessionBackward Compatibility
- Standard protocol adherence ensures long-term compatibility
- Token format changes will be communicated with migration period
- Deprecated flows will be supported for at least 12 months
Support Information
Documentation Resources
- Getting Started Guide: Complete setup and onboarding
- Authentication Guide: OAuth flows and implementation details
- API Reference: Complete endpoint documentation
- Error Handling: Error codes and troubleshooting
- Quick Reference: Single-page cheat sheet
Interactive Tools
- OpenID Discovery: Auto-configuration endpoint
- Postman Collection: Pre-configured OAuth flows
- Integration Examples: Sample implementations
Getting Help
- Technical Documentation: Review our comprehensive guides above
- Integration Examples: Check sample implementations for various platforms
- Security Issues: Report security vulnerabilities through secure channels only
- Support: Contact your system administrator for assistance
Security Considerations
- Always use HTTPS for all authentication requests
- Store client secrets securely (never in client-side code)
- Implement proper token storage and rotation
- Use PKCE for public clients (SPAs, mobile apps)
- Validate tokens on the server side
- Implement proper logout flows
Documentation Navigation
This documentation is organized into focused sections for different aspects of identity integration:
For New Developers
- Getting Started - Complete onboarding guide
- Authentication - OAuth flows and security setup
- Quick Reference - Essential endpoints and examples
For Integration Development
- API Reference - Complete endpoint documentation
- Error Handling - Error management strategies
- Integration Examples - Code samples and patterns
For Advanced Use Cases
- Token Management - Token lifecycle and validation
- Session Management - SSO and logout flows
- Postman Collection - Pre-built OAuth requests
Last Updated: Generated for Identity Service v1.0 Protocol Version: OAuth 2.0 / OpenID Connect 1.0 Documentation Version: 1.0.0
