Gathering detailed insights and metrics for oidc-provider
Gathering detailed insights and metrics for oidc-provider
npm install oidc-provider
Typescript
Module System
Node Version
NPM Version
95.4
Supply Chain
97.5
Quality
85.6
Maintenance
100
Vulnerability
100
License
JavaScript (98.76%)
TypeScript (0.63%)
EJS (0.61%)
Total Downloads
7,402,567
Last Day
11,072
Last Week
57,556
Last Month
202,430
Last Year
2,636,976
3,288 Stars
2,538 Commits
772 Forks
72 Watching
4 Branches
67 Contributors
Latest Version
8.6.1
Package Id
oidc-provider@8.6.1
Unpacked Size
538.27 kB
Size
132.12 kB
File Count
200
NPM Version
10.9.0
Node Version
22.12.0
Publised On
19 Jan 2025
Cumulative downloads
Total Downloads
Last day
-8.6%
11,072
Compared to previous day
Last week
-12.4%
57,556
Compared to previous week
Last month
-15.1%
202,430
Compared to previous month
Last year
42.6%
2,636,976
Compared to previous year
13
This module provides an OAuth 2.0 (RFC 6749) Authorization Server with support for OpenID Connect (OIDC) and many other additional features and standards.
Table of Contents
The following specifications are implemented by oidc-provider (not exhaustive):
Note that not all features are enabled by default, check the configuration section on how to enable them.
RFC6749
- OAuth 2.0 & OIDC
Core 1.0Discovery 1.0
RP-Initiated Logout 1.0
Back-Channel Logout 1.0
RFC7009
- OAuth 2.0 Token RevocationRFC7636
- Proof Key for Code Exchange (PKCE
)RFC7662
- OAuth 2.0 Token IntrospectionRFC8252
- OAuth 2.0 for Native Apps BCP (AppAuth
)RFC8628
- OAuth 2.0 Device Authorization Grant (Device Flow
)RFC8705
- OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens (MTLS
)RFC8707
- OAuth 2.0 Resource IndicatorsRFC9101
- OAuth 2.0 JWT-Secured Authorization Request (JAR
)RFC9126
- OAuth 2.0 Pushed Authorization Requests (PAR
)RFC9207
- OAuth 2.0 Authorization Server Issuer Identifier in Authorization ResponseRFC9449
- OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer (DPoP
)FAPI 1.0
)JARM
)CIBA
)Supported Access Token formats:
The following draft specifications are implemented by oidc-provider:
FAPI-CIBA
) - Implementer's Draft 01FAPI 2.0
) - Implementer's Draft 02FAPI 2.0
) - Implementer's Draft 01Updates to draft specification versions are released as MINOR library versions,
if you utilize these specification implementations consider using the tilde ~
operator in your
package.json since breaking changes may be introduced as part of these version updates. Alternatively
acknowledge the version and be notified of breaking changes as part of
your CI.
Filip Skokan has certified that oidc-provider
conforms to the following profiles of the OpenID Connect™ protocol.
If you want to quickly add OpenID Connect authentication to Node.js apps, feel free to check out Auth0's Node.js SDK and free plan. Create an Auth0 account; it's free!
If you or your company use this module, or you need help using/upgrading the module, please consider becoming a sponsor so I can continue maintaining it and adding new features carefree. The only way to guarantee you get feedback from the author & sole maintainer of this module is to support the package through GitHub Sponsors.
oidc-provider can be mounted to existing connect, express, fastify, hapi, or koa applications, see how. The authorization server allows to be extended and configured in various ways to fit a variety of uses. See the documentation and example folder.
1import Provider from 'oidc-provider' 2const configuration = { 3 // refer to the documentation for other available configuration 4 clients: [ 5 { 6 client_id: 'foo', 7 client_secret: 'bar', 8 redirect_uris: ['http://lvh.me:8080/cb'], 9 // ... other client properties 10 }, 11 ], 12} 13 14const oidc = new Provider('http://localhost:3000', configuration) 15 16oidc.listen(3000, () => { 17 console.log( 18 'oidc-provider listening on port 3000, check http://localhost:3000/.well-known/openid-configuration', 19 ) 20})
Collection of useful configuration use cases are available over at recipes.
oidc-provider instances are event emitters, using event handlers you can hook into the various actions and i.e. emit metrics that react to specific triggers. See the list of available emitted event names and their description.
Version | Security Fixes 🔑 | Other Bug Fixes 🐞 | New Features ⭐ |
---|---|---|---|
v8.x | ✅ | ✅ | ✅ |
No vulnerabilities found.
Reason
13 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
packaging workflow detected
Details
Reason
0 existing vulnerabilities detected
Reason
SAST tool is not run on all commits -- score normalized to 5
Details
Reason
dependency not pinned by hash detected -- score normalized to 4
Details
Reason
branch protection is not maximal on development and all release branches
Details
Reason
Found 1/29 approved changesets -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
Reason
security policy file not detected
Details
Score
Last Scanned on 2025-01-20
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More