See openid-connect Menu

Implicit Flow

Deprecation Notice

There is a more recent version of this OpenId Connect API available. Learn more.

This endpoint will be deprecated on November 2nd 2020.

Use this API to authenticate a user as part of the OpenID Connect Implicit Flow and generate an ID Token for the user.

For more detail about the Implicit Flow see our Developer Overview for OpenID Connect.

Resource URL

https://<region><client id>&redirect_uri=<redirect uri>&response_type=id_token&scope=openid

Resource Parameter




Set to the region of your OneLogin instance.

e.g. oidc-sample where the instance is

Request Parameter




Set to the region of your OneLogin instance.

  • openid-connect
  • openid-connect-eu
e.g. If your OneLogin instance is located in Europe then use




The redirect uri that is registered with OneLogin for this OpenId Connect app. Note that there is a 10 minute delay when updating the allowed redirect_uri list via the admin portal.




Set to “id_token token”




Requires at least “openid”.

Add “profile” and/or “groups” to get additional user information returned in the id_token and User Info endpoint.




A secure random string that is used by the OpenID provider to protect against replay attacks. It will be returned as part of the JWT ID Token and should be used to validate the authenticity of the token.



A random string that is returned on success and can be used to verify the call and protect against cross site scripting attacks.



If this optional parameter is set to onelogin:nist:level:1:re-auth the user will be forced to re-authenticate regardless of their current session state. This value will also be returned in the acr claim of the ID Token.



Optional. If used must be set to one of the following:

  • login - The user will be prompted with a login dialog.
  • none - The user will not be prompted with a login dialog. If they do not have a current session a login_required error will be returned.



Optional. Set this to the user’s username or email to prepopulate the username field of the OneLogin login screen.

Sample Response

If the request parameters are valid a 302 redirect will occur to the registered redirect_uri with the following query parameters appended.

Success - Providing the id_token is validated


Error - Invalid Response Type


Error - Missing the scope parameter


Error - Prompt=none and the user was not authenticated


Missing the nonce

    "error": "invalid_request",
    "error_description": "missing required parameter(s). (nonce)"

Missing the redirect_uri

    "error": "invalid_request",
    "error_description": "missing required parameter(s). (redirect_uri)"

Invalid redirect_uri

    "error": "redirect_uri_mismatch",
    "error_description": "redirect_uri did not match any client's registered redirect_uri"

Invalid client_id

    "error": "invalid_client",
    "error_description": "client is invalid",
    "state": "61c07cd68b0c65a0e9a35bf6c4f472f4"

Response Elements

id_token A JWT containing user information and nonce for validation
state The state parameter provided in the initial request to help prevent cross site scripting attacks

ID Token Sample

  "sub": "35666371",
  "email": "",
  "preferred_username": "sally",
  "name": "Sally Tyler",
  "updated_at": "2018-04-12T21:55:56Z",
  "given_name": "Sally",
  "family_name": "Tyler",
  "groups": [
    "Admin Role",
    "User Role",
    "Custom Roll"
  "acr": "onelogin:nist:level:1:re-auth",
  "at_hash": "UnQAjiMVu7OhJYPHRNbhQA",
  "rt_hash": "ZUK9M1zLqc4O1XIGVZ8cng",
  "aud": "78d1d040-20c9-0136-5146-067351775fae92920",
  "exp": 1523577359,
  "iat": 1523570159,
  "iss": ""

Postman Collection

Replace sample variables indicated by {{ }} with your actual values.

Download for the OpenId Connect API

Have a Question?

Have a how-to question? Seeing a weird error? Ask us about it on StackOverflow.

Found a bug? Submit a support ticket.

Have a product idea or request? Share it with us in our Ideas Portal.

StackOverflow discussions about "[onelogin] openid connect"

  • 6

    A: SAML for Native Mobile Apps(Android and IOS)

    Answered Apr 02 2018

    session you've established with an SSO provider) between native apps that also support SAML the same way. Basically, if you do this, you'll also be supporting SSO on mobile via SAML (or OpenID Connect, if you go that route) …

  • 5

    Q: How to use onelogin SSO with AngularJS?

    Asked Jun 20 2016

    questions: 1> Onelogin is using SAML instead of OpenID Connect. I am not asking what's the difference between these two, but what is recommended since everyone is moving towards OpenID Connect? 2> Does Onelogin supports AngularJS? I don't see any documentation for onelogin API with AngularJS & Node See Here … I was looking into Onelogin for SSO. We have applications written in .NET, AngularJS + Node. None of these applications are mobile applications. After going through their documentation I have few …

  • 3

    A: Does OneLogin support client session management via OIDC?

    Answered Nov 16 2018 2.1. OpenID Provider Discovery Metadata These OpenID Provider Metadata parameters MUST be included in the Server's discovery … responses when Session Management and Discovery are supported: check_session_iframe ... end_session_endpoint ... I don't see these metadata parameters in the OneLogin discovery metadata, so it looks like Session Management is not supported. …

  • 2

    A: How to Validate an Access Token for OAuth2 + PCKE flow

    Answered Apr 25 2019

    returned from the auth code flow worked, and the access_token only returned {"active":false} after it expired. Make sure you are not setting the Authorization header, and only set your client_id in the payload. … I'm using OIDC with PKCE, and I managed to call the endpoint with a token retrieved via the authorization code flow: $ curl -i -d "token …

  • 2

    Q: Python/Django library for registering multiple SSO Identity Providers(OpenID Connect)

    Asked Nov 08 2019

    I'm working on a project written in Python(Django) and i recently added an SSO option for logging in with OneLogin accounts. There's already support for Microsofts Azure SSO from an earlier feature … . I'm looking for a library which can somehow register different identity providers(Microsoft, OneLogin, Facebook, etc...) and then wrap the similar login logic into a single class, which would handle …