ID-JAG — Cross-Domain Access (Xaa)
An ACME Corp employee uses their internal corporate identity to securely access the SaaS API. The Identity Assertion Authorization Grant (ID-JAG) lets ACME's IdP vouch for the user's identity without ever issuing external service tokens — each trust domain remains sovereign.
The ACME CRM App redirects the employee's browser to ACME's Identity Provider to begin an OpenID Connect authorization code flow. The IdP returns a 302 redirect to its login page, where the employee will authenticate with corporate credentials.
• scope=openid ensures this is an OIDC flow, which will return an ID Token alongside the access token.
• The nonce (n-0S6_WzA2Mj) is a one-time value included in the authorization request to prevent replay attacks — the IdP will embed it in the returned ID Token.
• The state parameter ties the authorization response back to this specific browser session, preventing CSRF.
• ID-JAG §3.1: The client must first obtain an ID Token from the user's internal IdP before it can request an ID-JAG.
Step 1: GET /authorize (OIDC)
idp.acme.example
Mozilla/5.0 (ACME-CRM/1.0)