OIDC is an identity layer on top of OAuth 2.0. It verifies user identity using an authorization server and returns claims in a secure way. Twingate uses OIDC to connect users to private resources without passing traffic through a VPN. Instead, it builds secure, distributed edge nodes, authenticating through your chosen identity provider.
When you enable OIDC for Twingate, sign‑in flows become both simpler and harder to break. The identity provider handles authentication. Twingate enforces authorization at the resource level. This separation means credentials never touch untrusted surfaces. Network segments stay invisible until the user is verified.
Configuration starts in your Twingate Admin Console. You register a new identity provider, select OIDC, and provide the client ID, client secret, and issuer URL from your IdP. Supported providers include Okta, Azure AD, Google Workspace, and standards‑compliant custom setups. Scope values define which claims to fetch — email, groups, unique identifiers — tied to the exact access rules you configure in Twingate.