Getting Started
OIDC, RBAC, and Billing
- Authentication & User Info
- GETGet OpenID Connect Configuration
- GETGet JSON Web Key Set (JWKS)
- GETAuthenticate using API Token
- GETGet Authenticated User Info (API)
- GETGet Authenticated User Info (OAuth)
- POSTEnable Two-Factor Authentication
- DELDisable Two-Factor Authentication
- POSTConfirm Two-Factor Authentication
- GETGet 2FA QR Code
- GETGet 2FA Secret Key
- GETGet 2FA Recovery Codes
- POSTGenerate New 2FA Recovery Codes
- GET
- User Management
- Ancillary Services
- Teams
- API Credentials
- Roles & Permissions
- Billing - Account
- Billing - Payment Methods
- Billing - Tax IDs
- Billing - Invoices
- Billing - Subscriptions
- Internal M2M
ARP and Devices
- Devices
Developers API
- Sites
- Health
- Synchronous API
- Asynchronous API
- Port Forwards
Asynchronous (MikroTik)
- Bootstrap & Adoption
- Heartbeat
- Jobs
- Runbooks
- Sites
- Internal
- SFTP Auth
Backups
- Site Backups
BGP Feeds And Content Filter
- DNS Policy
- Tunnels & Sites
- Categories & Applications
- BGP Policy
- IP Lists
- Internal Hooks
Captive Portal
- IDP Integrations
- Instances
- Walled Garden
Control Plane Filter
- Policies
- Sites
- Checkin
- Router Commands
- Internal
- Transient Access
- Transient Forward
- Credentials
- Scheduler
CVE Scans
- Scan Schedules
- Scan Results
- CVE Management
- On-Demand Scans
Elastic IP Addressing
- Subnets
- IP Addresses (L2TP)
Logging
- Log Events
Metrics
- Syslog
- ARP
- Interfaces
- MikrotikStats
- Content
- Tunnels
Monitoring & Health
- Faults
Notifications
- Topics
- Groups
Scheduled Scripts
- Community Scripts
- Scheduled Scripts
- AI Generation
Schedules
- Schedules
- Internal
SLA Reports
- SLA Schedules
- SLA Reports
VPN
- Servers
- Sites
- Instances
- Peers
- VPN Client Tokens
- Internal
WAN Failover
- Failover
- Tunnel
- Services
- Gateway
Webhooks
- Integrations
Authentication & User Info
Get OpenID Connect Configuration
Returns the OpenID Connect discovery document containing endpoints and capabilities.
GET
/
.well-known
/
openid-configuration
Copy
Ask AI
curl --request GET \
--url https://api.altostrat.io/.well-known/openid-configuration
Copy
Ask AI
{
"issuer": "<string>",
"authorization_endpoint": "<string>",
"token_endpoint": "<string>",
"userinfo_endpoint": "<string>",
"jwks_uri": "<string>",
"registration_endpoint": "<string>",
"scopes_supported": [
"<string>"
],
"code_challenge_methods_supported": [
"plain"
],
"subject_types_supported": [
"public"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"token_endpoint_auth_methods_supported": [
"client_secret_basic"
],
"claims_supported": [
"<string>"
],
"request_uri_parameter_supported": true,
"request_parameter_supported": true,
"token_endpoint_auth_signing_alg_values_supported": [
"RS256"
]
}
Response
200 - application/json
OpenID Connect configuration details.
The response is of type object
.
Copy
Ask AI
curl --request GET \
--url https://api.altostrat.io/.well-known/openid-configuration
Copy
Ask AI
{
"issuer": "<string>",
"authorization_endpoint": "<string>",
"token_endpoint": "<string>",
"userinfo_endpoint": "<string>",
"jwks_uri": "<string>",
"registration_endpoint": "<string>",
"scopes_supported": [
"<string>"
],
"code_challenge_methods_supported": [
"plain"
],
"subject_types_supported": [
"public"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"token_endpoint_auth_methods_supported": [
"client_secret_basic"
],
"claims_supported": [
"<string>"
],
"request_uri_parameter_supported": true,
"request_parameter_supported": true,
"token_endpoint_auth_signing_alg_values_supported": [
"RS256"
]
}
Assistant
Responses are generated using AI and may contain mistakes.