Sign in with Sentroy
Drop a "Sign in with Sentroy" button into your site and your users authenticate with their existing Sentroy account. Standard OAuth 2.0 authorization-code flow, OIDC-compliant id tokens, and a discovery document — works with anything that speaks the spec.
Standard endpoints
Authorization, token, userinfo, and OIDC discovery — exactly where the spec says they should be. If your library knows OAuth, it knows Sentroy Auth.
/.well-known/openid-configurationPer-company app registry
Each Sentroy company can register multiple OAuth clients with their own redirect URIs and scope allow-lists. Manage them from your dashboard.
Cross-subdomain SSO
Users already logged into sentroy.com skip the login step — consent screen pops up directly. One Sentroy account, every relying party.
Bring your stack
Use any OAuth library on your side: NextAuth, Passport, Authlib, Spring Security, Keycloak Adapter. Discovery metadata makes setup a one-liner in most.
Quickstart
auth.tsimport NextAuth from "next-auth"
export const { handlers, signIn, signOut, auth } = NextAuth({
providers: [
{
id: "sentroy",
name: "Sentroy",
type: "oidc",
issuer: "https://auth.sentroy.com",
clientId: process.env.SENTROY_CLIENT_ID!,
clientSecret: process.env.SENTROY_CLIENT_SECRET!,
authorization: { params: { scope: "openid profile email" } },
},
],
})
// Sign-in button (server action):
// "use server"
// await signIn("sentroy", { redirectTo: "/dashboard" })