Get OAuth 2.0 Consent Request

GET {{baseUrl}}/admin/oauth2/auth/requests/consent?consent_challenge=<string>

When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider to authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if the OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.

The consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent provider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted or rejected the request.

The default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please head over to the OAuth 2.0 documentation.

Request Params

KeyDatatypeRequiredDescription
consent_challengestring(Required) OAuth 2.0 Consent Request Challenge

HEADERS

KeyDatatypeRequiredDescription
Acceptstring

RESPONSES

status: OK

{&quot;challenge&quot;:&quot;\u003cstring\u003e&quot;,&quot;acr&quot;:&quot;\u003cstring\u003e&quot;,&quot;amr&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;client&quot;:{&quot;allowed_cors_origins&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;audience&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;authorization_code_grant_access_token_lifespan&quot;:&quot;2490535m351ns365070us92820513h8972ns8497821608s9030892548us13866h6482866684s06438m&quot;,&quot;authorization_code_grant_id_token_lifespan&quot;:&quot;880051h0720ms3448934985ms3759225m7856ns&quot;,&quot;authorization_code_grant_refresh_token_lifespan&quot;:&quot;&quot;,&quot;backchannel_logout_session_required&quot;:&quot;\u003cboolean\u003e&quot;,&quot;backchannel_logout_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;client_credentials_grant_access_token_lifespan&quot;:&quot;63761m25266137ns551542h07016381m113826h4407919669us75932s50s32326ns&quot;,&quot;client_id&quot;:&quot;\u003cstring\u003e&quot;,&quot;client_name&quot;:&quot;\u003cstring\u003e&quot;,&quot;client_secret&quot;:&quot;\u003cstring\u003e&quot;,&quot;client_secret_expires_at&quot;:&quot;\u003clong\u003e&quot;,&quot;client_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;contacts&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;created_at&quot;:&quot;\u003cdateTime\u003e&quot;,&quot;frontchannel_logout_session_required&quot;:&quot;\u003cboolean\u003e&quot;,&quot;frontchannel_logout_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;grant_types&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;implicit_grant_access_token_lifespan&quot;:&quot;902735408m7132us2640s237025967us&quot;,&quot;implicit_grant_id_token_lifespan&quot;:&quot;06s5644981us3850853h90032403ms02us67484m20299391h5s&quot;,&quot;jwks&quot;:{&quot;description&quot;:&quot;OAuth 2.0 Client JSON Web Key Set\n\nClient&#39;s JSON Web Key Set [JWK] document, passed by value. The semantics of the jwks parameter are the same as\nthe jwks_uri parameter, other than that the JWK Set is passed by value, rather than by reference. This parameter\nis intended only to be used by Clients that, for some reason, are unable to use the jwks_uri parameter, for\ninstance, by native applications that might not have a location to host the contents of the JWK Set. If a Client\ncan use jwks_uri, it MUST NOT use jwks. One significant downside of jwks is that it does not enable key rotation\n(which jwks_uri does, as described in Section 10 of OpenID Connect Core 1.0 [OpenID.Core]). The jwks_uri and jwks\nparameters MUST NOT be used together.&quot;},&quot;jwks_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;jwt_bearer_grant_access_token_lifespan&quot;:&quot;037262064ms&quot;,&quot;logo_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;metadata&quot;:{&quot;title&quot;:&quot;JSONRawMessage represents a json.RawMessage that works well with JSON, SQL, and Swagger.&quot;},&quot;owner&quot;:&quot;\u003cstring\u003e&quot;,&quot;policy_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;post_logout_redirect_uris&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;redirect_uris&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;refresh_token_grant_access_token_lifespan&quot;:&quot;149365371ns7165038us29813ms55s71350s59933m259660740s32372h&quot;,&quot;refresh_token_grant_id_token_lifespan&quot;:&quot;2927595227us518868827h75ns69771h&quot;,&quot;refresh_token_grant_refresh_token_lifespan&quot;:&quot;8328585ns1504385us&quot;,&quot;registration_access_token&quot;:&quot;\u003cstring\u003e&quot;,&quot;registration_client_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;request_object_signing_alg&quot;:&quot;\u003cstring\u003e&quot;,&quot;request_uris&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;response_types&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;scope&quot;:&quot;\u003cstring\u003e&quot;,&quot;sector_identifier_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;subject_type&quot;:&quot;\u003cstring\u003e&quot;,&quot;token_endpoint_auth_method&quot;:&quot;\u003cstring\u003e&quot;,&quot;token_endpoint_auth_signing_alg&quot;:&quot;\u003cstring\u003e&quot;,&quot;tos_uri&quot;:&quot;\u003cstring\u003e&quot;,&quot;updated_at&quot;:&quot;\u003cdateTime\u003e&quot;,&quot;userinfo_signed_response_alg&quot;:&quot;\u003cstring\u003e&quot;},&quot;context&quot;:{&quot;title&quot;:&quot;JSONRawMessage represents a json.RawMessage that works well with JSON, SQL, and Swagger.&quot;},&quot;login_challenge&quot;:&quot;\u003cstring\u003e&quot;,&quot;login_session_id&quot;:&quot;\u003cstring\u003e&quot;,&quot;oidc_context&quot;:{&quot;acr_values&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;display&quot;:&quot;\u003cstring\u003e&quot;,&quot;id_token_hint_claims&quot;:{&quot;labore_496&quot;:{},&quot;nostrud8&quot;:{}},&quot;login_hint&quot;:&quot;\u003cstring\u003e&quot;,&quot;ui_locales&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;]},&quot;request_url&quot;:&quot;\u003cstring\u003e&quot;,&quot;requested_access_token_audience&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;requested_scope&quot;:[&quot;\u003cstring\u003e&quot;,&quot;\u003cstring\u003e&quot;],&quot;skip&quot;:&quot;\u003cboolean\u003e&quot;,&quot;subject&quot;:&quot;\u003cstring\u003e&quot;}