OAuth 2.0 + OpenID Connect

Sign in with Sentroy

Drop a "Sign in with Sentroy" button into your site and your users authenticate with their existing Sentroy account. Standard OAuth 2.0 authorization-code flow, OIDC-compliant id tokens, and a discovery document — works with anything that speaks the spec.

Standard endpoints

Authorization, token, userinfo, and OIDC discovery — exactly where the spec says they should be. If your library knows OAuth, it knows Sentroy Auth.

/.well-known/openid-configuration

Per-company app registry

Each Sentroy company can register multiple OAuth clients with their own redirect URIs and scope allow-lists. Manage them from your dashboard.

Cross-subdomain SSO

Users already logged into sentroy.com skip the login step — consent screen pops up directly. One Sentroy account, every relying party.

Bring your stack

Use any OAuth library on your side: NextAuth, Passport, Authlib, Spring Security, Keycloak Adapter. Discovery metadata makes setup a one-liner in most.

Quickstart

auth.ts
import NextAuth from "next-auth"

export const { handlers, signIn, signOut, auth } = NextAuth({
  providers: [
    {
      id: "sentroy",
      name: "Sentroy",
      type: "oidc",
      issuer: "https://auth.sentroy.com",
      clientId: process.env.SENTROY_CLIENT_ID!,
      clientSecret: process.env.SENTROY_CLIENT_SECRET!,
      authorization: { params: { scope: "openid profile email" } },
    },
  ],
})

// Sign-in button (server action):
//   "use server"
//   await signIn("sentroy", { redirectTo: "/dashboard" })