In this image, an end user uses either a web site, mobile or desktop application and needs to access API or a web site.
Those scenarios are supported via OAuth 2 RFC 6749
We do not support Resource Owner Password Credential 1.3.3 as it requires the user to put his password on the client device.
We support Open ID Connect specification. To have ID token and session state, include the scope of "openid" in the authorization request.
A user needs to access an API or just to authenticate to some client application
A client needs to access an API. There is no user in this scenario. Open ID Connect does not apply
We use Open ID Connect Discovery to advertise the metadata. The metadata addresses are:
Region | URL |
---|---|
QA | https://authenticate.qa.bnymellon.com/.well-known/openid-configuration |
Production | https://authenticate.bnymellon.com/.well-known/openid-configuration |
Note: Only Production and QA regions are available externally.
When a user needs to access a protected resource. The application, which will access the resource, needs an access token (optionally ID token). It redirects the authorization request to the URL, specified in the "authorization_enpoint" of the metadata. The format of the authorization request is described in RFC 6749
When an application needs to access a resource. There is no user, or user information is irrelevant. To get an acces token it needs to call the token API to submit its credentials. The format of the authorization request is described in RFC 6749, section 1.3.4
Only Client Authentication with JWT is available to external clients. The client certificate nedes to be registered with BNY.