The server waits, but nothing moves until the right key is in place. In OpenID Connect (OIDC), that key is the provisioning key. It binds identity, access, and trust together in one precise handshake. Without it, no client can connect and no token can be issued.
The OIDC provisioning key is generated during initial setup between an identity provider (IdP) and a relying party (RP) or service. Its job is to authenticate configuration changes, register new applications, and secure the exchange of client credentials. In standard OAuth 2.0 flows, clients register to get a client ID and secret. In OIDC, provisioning keys can streamline and secure that registration, particularly in automated or large-scale deployments.
Security depends on careful handling. Provisioning keys should be created with strong entropy. They must be stored in a secure vault, never hardcoded, never committed to source control. Rotate them periodically. In some implementations, keys are scoped, meaning a single provisioning key can only register clients within a specific tenant or environment. This reduces blast radius if compromised.
A provisioning key lifecycle looks like this: