GET
/
.well-known
/
openid-configuration
curl -X GET https://sandbox.connect.hopae.com/.well-known/openid-configuration
{
  "issuer": "https://sandbox.connect.hopae.com",
  "authorization_endpoint": "https://sandbox.connect.hopae.com/auth",
  "token_endpoint": "https://sandbox.connect.hopae.com/token",
  "userinfo_endpoint": "https://sandbox.connect.hopae.com/userinfo",
  "jwks_uri": "https://sandbox.connect.hopae.com/jwks",
  "response_types_supported": ["code"],
  "scopes_supported": ["openid", "profile", "email", "phone", "address", "nationality"],
  "code_challenge_methods_supported": ["S256"],
  "subject_types_supported": ["pairwise"],
  "id_token_signing_alg_values_supported": ["RS256"]
}
Fetch Hopae’s OIDC discovery document to auto-configure your client with issuer metadata, endpoints, and supported capabilities.

Query Parameters

This endpoint accepts no query parameters.

Response

issuer
string
Issuer identifier (https://connect.hopae.com or sandbox equivalent).
authorization_endpoint
string
URL of the /auth endpoint.
token_endpoint
string
URL of the /token endpoint.
userinfo_endpoint
string
URL of the /userinfo endpoint.
jwks_uri
string
URL of the JSON Web Key Set used to validate ID tokens.
response_types_supported
string[]
Response types supported by the authorization endpoint.
scopes_supported
string[]
Scopes you can request (must include openid).
code_challenge_methods_supported
string[]
PKCE methods (S256).

Example

curl -X GET https://sandbox.connect.hopae.com/.well-known/openid-configuration
{
  "issuer": "https://sandbox.connect.hopae.com",
  "authorization_endpoint": "https://sandbox.connect.hopae.com/auth",
  "token_endpoint": "https://sandbox.connect.hopae.com/token",
  "userinfo_endpoint": "https://sandbox.connect.hopae.com/userinfo",
  "jwks_uri": "https://sandbox.connect.hopae.com/jwks",
  "response_types_supported": ["code"],
  "scopes_supported": ["openid", "profile", "email", "phone", "address", "nationality"],
  "code_challenge_methods_supported": ["S256"],
  "subject_types_supported": ["pairwise"],
  "id_token_signing_alg_values_supported": ["RS256"]
}