Skip to main content

Creating OAuth Authorization Servers

Create a free OAuth authorization server to secure a way for client applications to access resources.

What is FAPI?

The Financial-grade API (FAPI) working group, hosted by the OpenID Foundation, publishes hardened profiles of OAuth 2.0 and OpenID Connect for high-value API security. FAPI tightens the base specs with stricter client authentication, sender-constrained tokens, signed request objects, and audit-grade traceability.

Two profiles are in wide use:

  • FAPI 1.0 Advanced. Adopted by UK Open Banking, Brazil Open Finance, Australia CDR, and most regional open-finance regimes. Mandates mTLS or private_key_jwt client authentication, signed request objects (JAR), and JWS-signed authorization responses (JARM).
  • FAPI 2.0 Security Profile. Simplified, PKCE-only flow with mandatory Pushed Authorization Requests (PAR) and sender-constrained tokens via mTLS or DPoP. Increasingly referenced by newer regulations and reference implementations.

SecureAuth is certified by the OpenID Foundation for both FAPI 1.0 Advanced and FAPI 2.0 Security Profile. The same authorization server you stand up for a regular app meets the security bar required by open-banking regulators worldwide, so there is no separate "FAPI build" to provision.

FAPI is not fintech-only. Teams building APIs that handle healthcare records, partner B2B integrations, machine-to-machine calls, and other high-value data increasingly use FAPI-grade hardening as their baseline, because the alternative is rebuilding the same protections one-off per product.

FAPI 2.0 authorization flow

Spin up your authorization server

Every SecureAuth workspace ships with its own FAPI-ready authorization server. There is no separate AS to provision: create a workspace and the endpoints are live.

1. Register and log in

Register for a free tenant, then log in to the admin console.

2. Launch a workspace

Pick any workspace profile (B2C, B2B, Workforce, Agentic AI). Each profile ships with a pre-configured authorization server matching that use case. Grant types, token settings, and security policies are already tuned.

Workspace launcher in the SecureAuth admin console

3. Copy your authorization server URL

Your tenant is live. Copy the authorization server URL from the workspace overview. This is the base for every OAuth endpoint (/authorize, /token, /.well-known/openid-configuration, /par, etc.).

Authorization server URL on the workspace overview screen

Try it with the demo portal

The B2B CIAM Demo workspace ships with a sample application so you can see the FAPI flow end-to-end without writing any code.

  1. In the demo workspace, open Dashboards → Demo Portal and run through the sign-in.

    Demo Portal launcher inside the B2B CIAM demo workspace

  2. Inspect the tokens issued by your authorization server: ID Token, Access Token, and claims.

    Tokens issued to the Demo Portal application

Next steps

Applications and clients

Grants and client authentication

Workspaces