oxd 3.1.1 Documentation#
oxd exposes simple, static APIs web developers can use to facilitate user authentication and authorization against an external OAuth 2.0 identity provider (IDP) like the Gluu Server.
oxd offers long-term operational and security benefits for developers and organizations:
- oxd centralizes and standardizes OAuth 2.0 across web apps of all languages, and an ever-rotating group of code contributors.
- When new OAuth 2.0 features are available, or vulnerabilities are discovered, oxd is the only component that needs to be updated--your applications never have to be changed and regression tested.
- oxd is written, maintained and supported by OAuth 2.0 security experts.
oxd 3.1.1 includes functional and billing changes from previous versions. If you have older installations, review what's new in 3.1.x before proceeding with upgrades or new installations of oxd 3.1.1.
oxd only works with server-side web apps. To integrate single-page apps (SPAs), native apps and/or SaaS apps with your Gluu Server, review the Gluu Server SSO integration guide.
oxd 3.1.1 has been confirmed to work with the following standard OpenID Providers (OP) and UMA Authorization Servers (AS):
OpenID Providers (OP)#
UMA Authorization Servers (AS)#
If you have successfully tested oxd against another OP or AS, please email details to email@example.com.
The oxd software package includes the
oxd-server and the
oxd-server is designed to work as a standalone service daemon via sockets. By default, API calls to the
oxd-server must come via
localhost. Optionally, if you want to make RESTful calls over the web to
oxd-server, after installation you can enable the
Follow these steps to get started:
Step 1: Sign up on the oxd website to obtain your oxd license and $50 credit
Step 2: Install oxd on a server or VM
oxd-server needs to be installed on the same server(s) as the app(s) you are securing. If you enable
oxd-https-extension (steps 5-7), oxd can be installed on any server or VM with network access.
Step 3: Configure the
oxd-server and add your license keys
Step 4: Start the
To use the RESTful
oxd-https-extension, follow steps 5-7. Otherwise jump to step 8.
Step 5: Install the
oxd-https-extension (for manual installation only, skip if you installed oxd via Linux Package)
Step 6: Configure the
Step 7: Start the
The oxd OpenID Connect APIs can be used to send a user to an OpenID Connect Provider (OP) for authentication and to gather identity information ("claims") about the user
The oxd UMA APIs can be used to send a user to an UMA Authorization Server (AS) for access management policy enforcement, for example to centrally manage which people (or software clients) can access which web pages and APIs
Learn more in the oxd API section of the documentation.
View supported OpenID Connect Providers and UMA Authorization Servers below.
oxd native client libraries provide simple and flexible access to the oxd OpenID Connect and UMA authentication and authorization APIs.
Gluu currently publishes oxd plugins, modules, and extensions for the following open source applications:
Gluu does not guarantee specific functionality in the oxd plugins. If you find a bug or would like feature enhancements, we would be happy to discuss plugin development on a time and materials basis. Schedule a call with us to discuss the project scope and funding.
Pricing & Billing#
oxd 3.1.1 costs USD $0.33 per application per day. New accounts include a $50 credit that is automatically applied to usage fees incurred during the first 60 days after account creation.
Additional notes about pricing and billing:
Each time a new application connects to your
oxd-server, a record is created and you will be charged USD $0.33 each day the application remains active
At the end of each month usage fees are compiled and a billing summary is sent to all users associated with your account
On the 7th day of each month we will attempt to bill your credit card for usage fees incurred during the previous month
If the transaction is declined or there is no credit card on file, your oxd installation(s) will be deactivated and the sign-in process will stop working for applications that leverage your inactive oxd server
If you can not add a credit card, or would like to discuss volume discounts, contact us for an oxd site license
Do you want to use oxd with an open source project? Gluu is happy to provide free oxd licenses to qualified open source projects. Send an email to firstname.lastname@example.org.
Gluu offers free community support for oxd on the Gluu Support Portal. You can login to the support site using the same credentials that you use to access the oxd license management app (and vice versa). In fact, we use oxd and a Gluu Server to provide single sign-on across our oxd portal and support app!
If your organization needs guaranteed response times, private support, and priority access to our support and development team, Gluu offers a range of VIP support plans. You can schedule a meeting with us to discuss and move forward with purchasing a support contract.
What is oxd?
oxd is a mediator: it provides APIs that can be called by a web application that are easier than directly calling the APIs of an OpenID Connect Provider (OP) or an UMA Authorization Server (AS).
How is oxd licensed, and how much does it cost?
oxd is commercially licensed software. To start the oxd server you will need a valid license, which you can obtain for free by registering on the oxd website. For each application that leverages your oxd service, you will be charged USD $0.33 per day. So for example, if you have 10 applications leveraging your oxd server, you will be charged USD $3.30 per day. Usage fees are accumulated daily and billed at the end of each month. If you need a site license for oxd, schedule a call.
What types of applications can use oxd?
oxd only supports server-side web applications. If you are using the Gluu Server as your OP and need single sign-on (SSO) to single-page apps (SPAs), native apps or SaaS apps, please review the Gluu Server SSO integration guide.
What is the oxd-server?
oxd-server is a standalone service with socket connection. By default it's restricted to localhost (
localhost_only: true configuration in
oxd-conf.json). It's possible to turn off this restriction if you set
localhost_only: false in
What is the oxd-https-extension?
oxd-https-extension is a RESTful Jetty based server which accepts HTTP calls and redirects them to the
oxd-server. If you want to connect apps to your oxd server via
HTTPS, you can simply start the oxd-https-extension after deploying and configuring your oxd-server.
Where do I deploy oxd-server?
By default, the oxd-server must be deployed on the same server as the web application(s) you want to protect. However, with the
oxd-https-extension running, you can deploy a central, robust oxd service on dedicated server(s).
Why should I use oxd?
oxd offers a few key improvements over the traditional model of embedding OAuth 2.0 code in your applications:
If new vulnerabilities are discovered in OAuth2 / OpenID Connect, oxd is the only component that needs to be updated. The oxd APIs remain the same, so you don't have to change and regression test your applications
oxd is written, maintained, and supported by developers who specialize in application security. Because of the complexity of the standards--and the liability associated with poor implementations--it makes sense to rely on professionals who have read the specifications in their entirety and understand how to properly implement the protocols
Centralization reduces costs. By using oxd across your IT infrastructure for application security (as opposed to a handful of homegrown and third party OAuth2 client implementations), the surface area for vulnerabilities, issue resolution, and support is significantly reduced. Plus you who have someone to call if something goes wrong!
Which programming languages and frameworks does oxd have libraries for?
There are oxd libraries for many popular programming languages and frameworks. See above.
How do I get SSO across several websites?
You’ll need two things:
A central OpenID Connect Provider (OP) that holds the passwords and user information
Websites that use the OpenID Connect protocol to authenticate users
An easy way to accomplish the first--install and configure the free open source Gluu Server using the Linux packages for CentOS, Ubuntu, Debian or Red Hat. Or you can also utilize Google as your OpenID Connect Provider (OP). The second is accomplished by calling the oxd APIs in your applications to send users to the OP for login.
Can I use oxd plugins for social login?
oxd simply makes it easy to send users to an OpenID Connect Provider (OP) for login. If you want to offer users the option to use social login, that needs to be implemented at the OP. If you are using the Gluu Server as your OP, you can use Passport.js to configure and support social login.
Can I use oxd for two-factor authentication (2FA)?
Again, since oxd simply makes it easy to send users to an OpenID Connect Provider (OP) for login, two-factor authentication needs to be enforced at the OP. If you are using the Gluu Server as your OP, there are several built in two-factor authentication mechanisms. Learn more in the Gluu Server authentication guide.
Can I use Google or Microsoft Azure Active Directory as my OpenID Connect Provider?
We have tested and confirmed oxd to work with Google as an OP. Microsoft's OP implementation is not totally standard though, and therefore may require changes or updates to oxd to work.
Can I purchase support for the Gluu Server or oxd?
Yes, for information on paid support, visit our website.