> ## Documentation Index
> Fetch the complete documentation index at: https://docs.hopae.com/llms.txt
> Use this file to discover all available pages before exploring further.

# Discovery Document

> Retrieve the OIDC discovery metadata for Hopae Connect

Fetch Hopae's OIDC discovery document to auto-configure your client with issuer metadata, endpoints, and supported capabilities.

## Query Parameters

This endpoint accepts no query parameters.

## Response

<ResponseField name="issuer" type="string">
  Issuer identifier (`https://connect.hopae.com` or sandbox equivalent).
</ResponseField>

<ResponseField name="authorization_endpoint" type="string">
  URL of the `/auth` endpoint.
</ResponseField>

<ResponseField name="token_endpoint" type="string">
  URL of the `/token` endpoint.
</ResponseField>

<ResponseField name="userinfo_endpoint" type="string">
  URL of the `/userinfo` endpoint.
</ResponseField>

<ResponseField name="jwks_uri" type="string">
  URL of the JSON Web Key Set used to validate ID tokens.
</ResponseField>

<ResponseField name="response_types_supported" type="string[]">
  Response types supported by the authorization endpoint.
</ResponseField>

<ResponseField name="scopes_supported" type="string[]">
  Scopes you can request (must include `openid`).
</ResponseField>

<ResponseField name="code_challenge_methods_supported" type="string[]">
  PKCE methods (`S256`).
</ResponseField>

## Example

<RequestExample>
  ```bash theme={null}
  curl -X GET https://sandbox.connect.hopae.com/.well-known/openid-configuration
  ```
</RequestExample>

<ResponseExample>
  ```json Response theme={null}
  {
    "issuer": "https://sandbox.connect.hopae.com",
    "authorization_endpoint": "https://sandbox.connect.hopae.com/auth",
    "token_endpoint": "https://sandbox.connect.hopae.com/token",
    "userinfo_endpoint": "https://sandbox.connect.hopae.com/userinfo",
    "jwks_uri": "https://sandbox.connect.hopae.com/jwks",
    "response_types_supported": ["code"],
    "scopes_supported": ["openid", "profile", "email", "phone", "address", "nationality"],
    "code_challenge_methods_supported": ["S256"],
    "subject_types_supported": ["public"],
    "id_token_signing_alg_values_supported": ["RS256"]
  }
  ```
</ResponseExample>

## Related Endpoints

<CardGroup cols={2}>
  <Card title="Authorization" icon="arrow-right" href="/api-reference/oidc/auth">
    Build the /auth request
  </Card>

  <Card title="JWKS" icon="key" href="/api-reference/oidc/jwks">
    Retrieve signing keys (GET /jwks)
  </Card>
</CardGroup>
