KeySuiteTrousseau

OIDC Endpoints

Complete reference of all Trousseau OIDC/OAuth2 endpoints.

Base URL

All endpoints are relative to the Trousseau base URL:

https://auth.trousseau.app

Discovery

Use the OpenID Connect Discovery endpoint to auto-configure your OIDC client:

GET https://auth.trousseau.app/application/o/{your-slug}/.well-known/openid-configuration

This returns a JSON document with all endpoint URLs, supported scopes, signing algorithms, and more.

Authorization

Initiates the authentication flow. Redirect the user's browser here.

GET https://auth.trousseau.app/application/o/authorize/
ParameterRequiredDescription
client_idYesYour OIDC client ID
response_typeYescode
scopeYesSpace-separated scopes (must include openid)
redirect_uriYesRegistered callback URL
stateRecommendedRandom string for CSRF protection
code_challengeYesPKCE code challenge (S256)
code_challenge_methodYesS256

Token

Exchange an authorization code for tokens, or refresh existing tokens.

POST https://auth.trousseau.app/application/o/token/
Content-Type: application/x-www-form-urlencoded

Authorization code exchange

ParameterValue
grant_typeauthorization_code
codeAuthorization code from callback
redirect_uriSame as in authorization request
client_idYour client ID
client_secretYour client secret
code_verifierPKCE code verifier

Token refresh

ParameterValue
grant_typerefresh_token
refresh_tokenYour refresh token
client_idYour client ID
client_secretYour client secret

Response

{
  "access_token": "eyJ...",
  "token_type": "Bearer",
  "expires_in": 300,
  "refresh_token": "eyJ...",
  "id_token": "eyJ...",
  "scope": "openid email profile"
}

UserInfo

Retrieve the authenticated user's claims.

GET https://auth.trousseau.app/application/o/userinfo/
Authorization: Bearer {access_token}

Returns the same claims as the ID token. See Scopes & Claims for the full list.

JWKS

Retrieve the public keys used to sign tokens. Use this to validate ID token and logout token signatures.

GET https://auth.trousseau.app/application/o/{your-slug}/jwks/

Returns a standard JWK Set:

{
  "keys": [
    {
      "kty": "RSA",
      "alg": "RS256",
      "use": "sig",
      "kid": "...",
      "n": "...",
      "e": "AQAB"
    }
  ]
}

End Session (Logout)

Terminate the Trousseau SSO session and redirect the user.

GET https://auth.trousseau.app/application/o/{your-slug}/end-session/
ParameterRequiredDescription
id_token_hintRecommendedThe user's ID token
post_logout_redirect_uriRecommendedWhere to redirect after logout (must be registered)

See the SSO Logout guide for implementation details.

Token lifetimes

TokenDefault lifetimeConfigurable
Access token5 minutesPer partner (on request)
ID token5 minutesFollows access token
Refresh token30 daysPer partner (on request)
Authorization code60 secondsNo