OpenID Connect 1.0 endpoints
AM exposes the following OpenID Connect-related endpoints:
| AM Acting As… | Endpoint | Description | 
|---|---|---|
| Provider | Retrieves information about an authenticated user.
It requires a valid token issued with, at least, the  | |
| Provider | Validates unencrypted ID tokens (AM-specific endpoint). | |
| Provider | Retrieves OpenID Connect session information (OpenID Connect Session Management endpoint). | |
| Provider | Invalidates OpenID Connect sessions (OpenID Connect Session Management endpoint). | |
| Provider | ||
| Provider | Exposes the URL of the OpenID provider during OpenID Connect discovery. | |
| Provider | Exposes provider configuration for OpenID Connect discovery. | |
| Provider | Exposes the public keys that clients can use to verify the signature of client-side tokens and to encrypt OpenID Connect requests sent as a JWT. | |
| Relying Party | Exposes AM client public keys. Providers can use them to encrypt ID tokens sent to AM, and to verify JWT and object signatures coming from AM. | 
| When AM acts as an OpenID Connect provider,
the OAuth 2.0 endpoints support OpenID Connect specific parameters, such as  For a complete list of the endpoints and parameters AM supports as an OAuth 2.0/OpenID Connect provider, see OAuth 2.0 endpoints and OAuth 2.0 administration REST endpoints. |