Accountmaker Docs
Features

OAuth

OAuth 2.0 and OpenID Connect authorization server for secure third-party integrations.

oauth2 openid-connect authorization tokens scopes

OAuth

AM is a full OAuth 2.0 and OpenID Connect authorization server—issue tokens, validate scopes, and integrate with any OAuth-compatible system.

Whether you’re building mobile apps, SPAs, IoT devices, or service-to-service integrations, AM supports the appropriate flow.

Supported Flows

Authorization Code (with PKCE)

For web and mobile apps. Supports S256 and plain PKCE methods.

AMClient AppUserAMClient AppUserLogin request/oauth2/authorize + code_challengeLogin formCredentialsAuthorization code/oauth2/token + code_verifierAccess + ID + Refresh tokens

Device Authorization (RFC 8628)

For TVs, CLIs, and IoT devices without browsers.

User (Phone)AMDeviceUser (Phone)AMDevicePOST /oauth2/device_authorizationdevice_code + user_code + verification_uriDisplay code to userVisit URI, enter codeAuthorizePoll /oauth2/tokenAccess token

Refresh Token

Obtain new access tokens without re-authentication.

Client Credentials

Service-to-service authentication. No user involved.

JWT Bearer (RFC 7523)

Exchange a signed JWT for an access token.

SAML 2.0 Bearer (RFC 7522)

Exchange a SAML assertion for an access token.

Token Exchange (RFC 8693)

Exchange an existing access token for a more specific token.

Endpoints

EndpointPurpose
/oauth2/authorizeStart authorization, show login
/oauth2/tokenExchange code/credentials for tokens
/oauth2/userinfoGet user profile claims (OIDC)
/oauth2/introspectValidate token (RFC 7662)
/oauth2/revokeInvalidate refresh token
/oauth2/device_authorizationStart device flow
/.well-known/openid-configurationOIDC discovery
/.well-known/jwks.jsonPublic signing keys

Scopes

ScopeAccess Granted
openidOIDC ID token
profileName, picture, locale
emailEmail address, verified status
offline_accessRefresh tokens

Token Configuration

Per-client settings for:

  • Access token lifetime (default: 1 hour)
  • Refresh token lifetime (default: 14 days)
  • ID token claims
  • Signing algorithm (RS256)
  • Cookie storage options