Cette page est affichée en anglais. Une traduction française est en cours.
KnowledgeMay 14, 2026·2 min de lecture

Awesome OpenID Connect — OIDC Providers & SDKs

Awesome OpenID Connect is a CC0 index of OIDC providers, libs, and learning links—handy when you need OAuth/OIDC choices for agent tools (110★).

Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Native · 94/100Policy : autoriser
Surface agent
Tout agent MCP/CLI
Type
Memory
Installation
Bundle
Confiance
Confiance : Established
Point d'entrée
gh repo clone cerberauth/awesome-openid-connect
Commande CLI universelle
npx tokrepo install a677d6a3-f1b2-5d59-b583-73afd2606013
Introduction

Awesome OpenID Connect is a CC0 index of OIDC providers, libs, and learning links—handy when you need OAuth/OIDC choices for agent tools (110★).

Best for: Builders adding secure login to agent tools (MCP servers, dashboards, internal apps) who need a fast shortlist of OIDC options

Works with: GitHub (clone/fork), local search tools, and your existing auth stack; use it as a reference during architecture decisions

Setup time: 3-12 minutes

Main

  • Provider shortlist: lists many real-world OIDC providers (open source and SaaS) so you can compare by ecosystem quickly.
  • Library coverage: includes SDKs and reference implementations (Node, .NET, Java, etc.), useful when integrating into agent backends.
  • Security context: links to OIDC/OAuth learning resources so teams can align on flows before shipping.
  • Pairs well with MCP auth: when your MCP server needs OAuth/OIDC, this helps you pick a provider/library combination faster.

FAQ

  • Is this a library?: No. It is a curated index. You still install the specific provider or SDK you choose.
  • How do I use it effectively?: Search by your language/runtime first, then shortlist providers that match your deployment model.
  • What is a quick sanity check?: Prefer entries with active maintenance and clear documentation; then validate with your threat model.
🙏

Source et remerciements

Source: https://github.com/cerberauth/awesome-openid-connect > License: CC0-1.0 > GitHub stars: 110 · forks: 22

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires