Documentation Index
Fetch the complete documentation index at: https://docs.alterauth.com/llms.txt
Use this file to discover all available pages before exploring further.
What are Identity Providers?
When application users authenticate through Auth0 or Clerk, Alter Vault syncs their identity for access control and lifecycle management. This means when a user is removed from the organization in the identity provider, their OAuth grants in Alter Vault are immediately revoked — no manual cleanup required.Automatic Deprovisioning
When users leave the organization, their OAuth grants are immediately revoked and stored tokens deleted.
Group-Based Policies
Control which groups can access which OAuth providers using the groups defined in the identity provider.
Zero Configuration
Auto-detect IDP type and claim mappings from the OIDC issuer URL.
End-User Authentication
Enable browser-based sign-in for SDK and Wallet dashboard via OIDC.
How It Works
Two Sync Strategies
Alter Vault supports two strategies for syncing user identity from the identity provider:| Strategy | When to Use | Latency | Setup |
|---|---|---|---|
| Webhooks | Auth0 and Clerk | Near real-time | Enable in Developer Portal, configure IDP |
| Lazy JWT Sync | All OIDC IDPs | On token request | Automatic (zero config) |
Single-IDP rule: only one identity provider can be active per application at a time. To switch providers, remove the current IDP and add the replacement. Replacing the provider updates the app-level identity contract.
Webhooks (Recommended)
Auth0 and Clerk push user lifecycle events to Alter Vault in real time. When a user is deleted or has their organization membership removed, Alter Vault immediately revokes their OAuth grants and deletes their stored tokens. Set up webhooks →Lazy JWT Sync
When the application passes a JWT to Alter Vault during a token request, Alter Vault automatically extracts user identity and group memberships from the JWT claims. No additional configuration required beyond adding the identity provider. Get started with IDP setup →How the IDP Connects to the SDK
Once an IDP is registered for an application, it connects to the SDK in two ways. Both can be used in the same app, but they are not independent on a single SDK instance:vault.authenticate() installs its token as the active token source and overrides any constructor-provided user_token_getter / userTokenGetter for subsequent provider requests.
1. Pass a user JWT for identity-based grant resolution
The application already signs users in through the IDP and holds a JWT. Pass that JWT to the SDK throughuser_token_getter (Python) / userTokenGetter (TypeScript), then call vault.request(..., provider="google"). The backend validates the JWT against the IDP’s JWKS, resolves the sub claim to a user, and returns the grant that belongs to them — no grant_id bookkeeping required.
2. Let the SDK drive the login (vault.authenticate())
If the application does not already hold a JWT — for example, a local CLI, an MCP server, or any process without a browser session — call vault.authenticate(). The SDK opens a browser-based OIDC flow through the IDP, handles the callback, and caches the resulting token. Subsequent vault.request(..., provider=...) calls reuse that token automatically. If user_token_getter / userTokenGetter was set in the constructor, authenticate() takes precedence on that SDK instance.
What happens under the hood
See the IDP Setup Guide for step-by-step instructions on registering the IDP and configuring OIDC client credentials.Supported Identity Providers
Alter Vault auto-detects the IDP type from the issuer URL and configures claim mappings automatically.Auth0
JWT validation and Log Streams webhook support
Clerk
JWT validation and Svix-signed webhook support
Enterprise SSO (Okta, Entra ID, SAML): Both Auth0 and Clerk support upstream enterprise identity providers as first-class connections. Route enterprise customers through Auth0 or Clerk to take advantage of Alter Vault’s lifecycle sync without direct Okta/Entra integration.
Next Steps
IDP Setup Guide
Step-by-step guide to connecting Auth0 or Clerk
Supported Providers
Provider capabilities and claim conventions