step oauth


step oauth -- authorization and single sign-on using OAuth & OIDC


step oauth
[--provider=<provider>] [--client-id=<client-id> --client-secret=<client-secret>]
[--scope=<scope> ...] [--bare [--oidc]] [--header [--oidc]] [--prompt=<prompt>]

step oauth
--client-id=<client-id> --client-secret=<client-secret>
[--scope=<scope> ...] [--bare [--oidc]] [--header [--oidc]] [--prompt=<prompt>]

step oauth [--account=<account>]
[--scope=<scope> ...] [--bare [--oidc]] [--header [--oidc]] [--prompt=<prompt>]

step oauth --account=<account> --jwt
[--scope=<scope> ...] [--header] [-bare] [--prompt=<prompt>]


step oauth command implements the OAuth 2.0 authorization flow.

OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. This mechanism is used by companies such as Amazon, Google, Facebook, Microsoft and Twitter to permit the users to share information about their accounts with third party applications or websites. Learn more at

This command by default performs he authorization flow with a preconfigured Google application, but a custom one can be set combining the flags --client-id, --client-secret, and --provider. The provider value must be set to the OIDC discovery document (.well-known/openid-configuration) endpoint. If Google is used this flag is not necessary, but the appropriate value would be be or


--provider=value, --idp=value OAuth provider for authentication

--email=value, -e=value Email to authenticate

--console, -c Complete the flow while remaining only inside the terminal

--client-id=value OAuth Client ID

--client-secret=value OAuth Client Secret

--account=value JSON file containing account details

--authorization-endpoint=value OAuth Authorization Endpoint

--token-endpoint=value OAuth Token Endpoint

--header Output HTTP Authorization Header (suitable for use with curl)

--oidc Output OIDC Token instead of OAuth Access Token

--bare Only output the token

--scope=value OAuth scopes

--prompt=value Whether the Authorization Server prompts the End-User for reauthentication and consent. OpenID standard defines the following values, but your provider may support some or none of them:

  • none: The Authorization Server MUST NOT display any authentication or consent user interface pages. An error is returned if an End-User is not already authenticated or the Client does not have pre-configured consent for the requested Claims or does not fulfill other conditions for processing the request.

  • login: The Authorization Server SHOULD prompt the End-User for reauthentication. If it cannot reauthenticate the End-User, it MUST return an error, typically login_required.

  • consent: The Authorization Server SHOULD prompt the End-User for consent before returning information to the Client. If it cannot obtain consent, it MUST return an error, typically consent_required.

  • select_account: The Authorization Server SHOULD prompt the End-User to select a user account. This enables an End-User who has multiple accounts at the Authorization Server to select amongst the multiple accounts that they might have current sessions for. If it cannot obtain an account selection choice made by the End-User, it MUST return an error, typically account_selection_required.

--jwt Generate a JWT Auth token instead of an OAuth Token (only works with service accounts)

--listen=address Callback listener address (e.g. ":10000")

--listen-url=url The redirect_uri url in the authorize request (e.g. "")

--redirect-url=url The url to open in the system browser when the OAuth flow is successful.


Do the OAuth 2.0 flow using the default client:

$ step oauth

Redirect to localhost instead of

$ step oauth --listen localhost:0

Redirect to a fixed port instead of random one:

$ step oauth --listen :10000

Redirect to a fixed url but listen on all the interfaces:

$ step oauth --listen --listen-url

Get just the access token:

$ step oauth --bare

Get just the OIDC token:

$ step oauth --oidc --bare

Use a custom OAuth2.0 server:

$ step oauth --client-id my-client-id --client-secret my-client-secret \ --provider