Getting Started
Create a tenant, register an application, and generate client credentials.
Before you can integrate Idura Verify into your application, you need to configure your environment in the Idura Dashboard. This takes about two minutes and will give you the client credentials required to build your own eID-based login flows.
A tenant represents your organization's isolated environment at Idura.
Risk-free testing: Your free account includes a sandbox environment with unlimited test logins, allowing you to build and test your integration without any obligations or unexpected costs.
Everything you do with Idura requires a domain to route your authentication requests.
.test.idura.broker domain for your local development and testing.acme-corp.test.idura.broker.An application represents the software you are building (e.g., your React frontend or Node.js backend). Registering an application generates the client credentials you will use in your code to configure your software to communicate with Idura Verify.
urn:my:application:identifier:123) or create a custom one.http://localhost:3000/api/auth/callback for local development).
Note: Wildcards are not supported, but you can always add more URLs to the list.Client secrets are for server-side applications only. If you are building a Single Page Application or a native mobile app, you cannot securely store a secret. Skip this step and use PKCE instead.
For maximum security in production, we recommend moving away from client secret authentication and replacing it with safer alternatives:
Learn more in our OpenID Connect best security practices guide.
Your dashboard is configured and your API credentials are ready to use.
To be able to run test logins, you need to create a test user for the eID(s) you're planning to use. Note that you can't use your real, personal eID in a test environment.