OAuth2c: user-friendly OAuth CLI

oauth2c
is a command-line tool for interacting with OAuth 2.0 authorization servers. Its goal is to make it easy to fetch access tokens
using any grant type or client authentication method. It is compliant with almost all basic and advanced OAuth 2.0, OIDC, OIDF FAPI and JWT profiles.

Features
- support for authorization code, hybrid, implicit, password, client credentials, refresh token, JWT bearer, token exchange, device grant flows
- support for client secret basic, client secret post, client secret JWT, private key JWT, TLS client auth client authentication methods
- passing request parameters as plaintext, signed, and/or encrypted JWT
- support for Proof Key for Code Exchange (PKCE)
- support for JWT Secured Authorization Response Mode (JARM)
- support for Pushed Authorization Requests (PAR)
Installation
To install oauth2c
, you have several options depending on your operating system.
Install on Mac
On Mac, you can install oauth2c
using brew
by running the following command:
brew install cloudentity/tap/oauth2c
Install on Linux
On linux, you can install oauth2c
using the installation script by running the following command:
curl -sSfL https://raw.githubusercontent.com/cloudentity/oauth2c/master/install.sh | \
sudo sh -s -- -b /usr/local/bin latest
Compile from source
You can also compile oauth2c
from source using go
. To do this run the following command:
go install github.com/cloudentity/oauth2c@latest
Alternatively, you can download a pre-built binary from the releases page.
Usage
To use oauth2c
, run the following command and follow the prompts:
oauth2c [issuer url] [flags]
The available flags are:
--actor-token string acting party token
--actor-token-type string acting party token type
--assertion string claims for jwt bearer assertion
--auth-method string token endpoint authentication method
--client-id string client identifier
--client-secret string client secret
--encrypted-request-object pass request parameters as encrypted jwt
--encryption-key string path or url to encryption key in jwks format
--grant-type string grant type
-h, --help help for oauthc
--insecure allow insecure connections
--par enable pushed authorization requests (PAR)
--password string resource owner password credentials grant flow password
--pkce enable proof key for code exchange (PKCE)
--refresh-token string refresh token
--request-object pass request parameters as jwt
--response-mode string response mode
--response-types strings response type
--scopes strings requested scopes
--signing-key string path or url to signing key in jwks format
-s, --silent silent mode
--subject-token string third party token
--subject-token-type string third party token type
--tls-cert string path to tls cert pem file
--tls-key string path to tls key pem file
--tls-root-ca string path to tls root ca pem file
--username string resource owner password credentials grant flow username
oauth2c
opens a browser for flows such as authorization code and starts an HTTP server which acts as a client application and waits for a callback.
Note: To make browser flows work add http://localhost:9876/callback
as a redirect URL to your client.
oauth2c
prints all the requests it made to obtain an access token. If you want to integrate it with CI/CD pipeline use the --silent
flag.
For more information on the available options and arguments run oauth2c --help
.
Example
Run the following command to get an access token using authorization code flow:
oauth2c https://oauth2c.us.authz.cloudentity.io/oauth2c/demo \
--client-id cauktionbud6q8ftlqq0 \
--client-secret HCwQ5uuUWBRHd04ivjX5Kl0Rz8zxMOekeLtqzki0GPc \
--response-types code \
--response-mode query \
--grant-type authorization_code \
--auth-method client_secret_basic \
--scopes openid,email,offline_access
See examples for more.
License
oauth2c
is released under the Apache v2.0.
Contributing
We welcome contributions! If you have an idea for a new feature or have found a bug, please open an issue on GitHub.