Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Generic OAuth connector supports the OAuth 2.0 authorization code flow for any authorization server that implements the standard token and authorization endpoints. Unlike the Generic OIDC connector, which is designed for full identity providers, this connector targets authorization servers that only implement OAuth 2.0 without OpenID Connect.Use Cases
- Integrate non-IDP authorization servers — Connect to services like GitHub, Atlassian, or other platforms that provide OAuth 2.0 authorization but not full OIDC support
- Access third-party APIs on behalf of users — Obtain OAuth tokens for services where your application needs to call APIs using delegated user authorization
- Unify authorization across diverse platforms — Bring OAuth-only services into your Identity Fabric alongside OIDC and SAML providers for centralized orchestration
Setup
- Configuration
The OAuth connector supports two configuration approaches. Use Option 2: Manually specifying authorize and token URLs
For the complete field reference including health checks, see Identity Fabric.
wellKnownURL when
the authorization server publishes a discovery document, or manually specify the
authorizeURL and tokenURL endpoints. These two options are mutually exclusive.Option 1: Using a well-known discovery URLmaverics.yaml
maverics.yaml
Configuration Reference
| Key | Type | Required | Description |
|---|---|---|---|
name | string | Yes | Unique connector identifier referenced in app policies |
type | string | Yes | Must be oauth |
clientID | string | Yes | OAuth 2.0 client ID from the authorization server |
clientSecret | string | Yes | OAuth 2.0 client secret (use secret reference syntax) |
wellKnownURL | string | Conditional | OAuth discovery endpoint URL. Mutually exclusive with authorizeURL and tokenURL. |
authorizeURL | string | Conditional | OAuth 2.0 authorization endpoint. Required if wellKnownURL is not set. Mutually exclusive with wellKnownURL. |
tokenURL | string | Conditional | OAuth 2.0 token endpoint. Required if wellKnownURL is not set. Mutually exclusive with wellKnownURL. |
loginRedirect.urls | list | Yes | Callback URL(s) where the authorization server redirects users after authorization |
scopes | string | No | Space-separated OAuth scopes to request |
Troubleshooting
- Verify the
authorizeURLandtokenURLare accessible from the Orchestrator host — confirm both endpoints respond correctly - If using
wellKnownURL, ensure the discovery document URL is correct and returns valid JSON withauthorization_endpointandtoken_endpointfields - Ensure the
loginRedirectURLs match exactly what is registered with the authorization server - Check that the client secret reference resolves correctly via your secret provider
- Verify the requested
scopesare valid for the authorization server — invalid scopes may cause authorization failures
Related Pages
Identity Fabric
Overview of all identity providers
Generic OIDC
Generic OpenID Connect connector
Generic SAML
Generic SAML 2.0 connector