ezforge_managed— ezForge handles OAuth 2.0 / OIDC. Clients register via the OAuth clients API and tokens are issued by the ezForge authorization server.byoa(Bring Your Own Auth) — The server delegates authentication to an external OIDC provider. You supply the provider’s endpoints and ezForge validates tokens against them.
Get auth config
200:
For ezforge_managed:
byoa:
Update auth config
byoa, all four BYOA config fields are required.
Request body — switch to ezforge_managed:
byoa:
| Field | Type | Required | Description |
|---|---|---|---|
authMode | string | ✓ | ezforge_managed or byoa |
byoaConfig | object | When byoa | OIDC provider endpoints (all four sub-fields required) |
byoaConfig.authorizationEndpoint | string (URL) | When byoa | OAuth 2.0 authorization endpoint — must use https |
byoaConfig.tokenEndpoint | string (URL) | When byoa | OAuth 2.0 token endpoint — must use https |
byoaConfig.jwksUri | string (URL) | When byoa | JWKS URI for token validation — must use https |
byoaConfig.issuer | string (URL) | When byoa | Token issuer (RFC 8414 §2 — no query or fragment) — must use https |
200: Updated auth config object (same shape as GET response).