# What is OIDC? ## [  ](https://www.authelia.com/ "https://www.authelia.com/") [  ](https://github.com/authelia/authelia "https://github.com/authelia/authelia") [  ](https://hub.docker.com/r/authelia/authelia "https://hub.docker.com/r/authelia/authelia") ## ## ## ## Overview
This page shows **one** example use case of [OpenID Connect (OIDC)](https://openid.net/connect/), using Traefik as a reverse proxy, [Authelia](https://www.authelia.com/) as an identity provider (OIDC Provider), and Linkwarden (the “Relying Party”). Please note that OIDC supports **many** different use cases and flow types—this walkthrough is just to demonstrate **one** approach.
--- [](https://wiki.aeoneros.com/uploads/images/gallery/2025-02/50tpl4yni8gVn6KC-how-oidc-works.webp) ## Example OIDC Flow 1. **User goes to the Relying Party (Linkwarden).** The user attempts to access Linkwarden, which is behind Traefik. Because Linkwarden requires authentication, the user must log in. 2. **User chooses to log in with the OIDC Provider (Authelia).** When the user selects a “Login with Authelia” option, Linkwarden (through Traefik) redirects the user to Authelia. 3. **User gets redirected to the OIDC Provider (Authelia).** The browser is sent to Authelia’s login page. 4. **User logs in with the OIDC Provider (Authelia).** Authelia verifies the user’s credentials (for example, via LDAP, a local user database, or some other method). 5. **OIDC Provider (Authelia) generates an ID Token (JWT).** - This ID Token contains “claims” (such as username, groups, and email) based on the **scopes** defined in Authelia’s configuration. - Authelia signs the ID Token (it is a JWT) before sending it back to Linkwarden (the Relying Party). Here’s a simple table of possible scopes and example claim data:**Scope** | **Claim** |
---|---|
**Profile** | Name |
**Groups** | Groupa, Groupb, Groupc |
**Email** | test @gmail.com |