Skip to main content

Use AgeKey Authorization

The Use AgeKey authorization endpoint initiates the age verification flow for users who already have an AgeKey. Your application should redirect the user's browser to this endpoint with the appropriate parameters to start the verification process.

OIDC Specification

This endpoint implements the OpenID Connect Implicit Flow with id_token response type.

Authorization endpoint

curl -X GET "https://api.agekey.org/v1/oidc/use" \
-G \
-d "scope=openid" \
-d "response_type=id_token" \
-d "client_id=your-client-id" \
-d "redirect_uri=https://yourapp.com/agekey/callback" \
-d "state=abc123xyz789" \
-d "nonce=nonce456def" \
-d "claims=%7B%22age_thresholds%22%3A%5B13%2C18%5D%7D"

Parameters

ParameterTypeRequiredDescription
scopestringYesAlways set to openid, optionally can also set agekey_upgrade if upgrades are allowed
response_typestringYesAlways set to id_token
client_idstringYesYour AgeKey client ID
redirect_uristringYesWhere users return after verification
statestringYesClient-generated value for CSRF protection and maintaining application state
noncestringYesRandom value for replay protection
claimsstringYesURL-encoded JSON specifying age thresholds and other constraints

Claims parameter

The claims parameter must be a URL-encoded JSON object specifying which age thresholds to verify and filtering criteria:

FieldTypeRequiredDescription
age_thresholdsarrayYesArray of age thresholds to verify (for example [13, 18, 21])
allowed_methodsarrayNoArray of verification methods to accept. (for example ["id_doc_scan", "payment_card_network"]) All verification methods are considered when not provided.
verified_afterstringNoISO 8601 date/datetime - only accept verifications after this date
provenanceobjectNoFilter by verification provider origin (see provenance structure below)
overridesobjectNoMethod-specific filtering rules (see overrides structure below)

Provenance structure:

Provenance filtering allows you to control which verification providers are accepted based on their origin path. Each provider has a unique provenance path that identifies the verification technology used.

FieldTypeDescription
allowedarrayAllowed provenance patterns. Use * suffix for prefix matching (for example /veratad/* matches all Veratad providers)
deniedarrayDenied provenance patterns. Takes precedence over allowed. Use to exclude specific providers

Pattern matching:

  • Patterns must start with / and use lowercase letters, numbers, and underscores
  • Use /* suffix for prefix matching (for example /veratad/* matches /veratad/internal, /veratad/trinsic, and other paths under that prefix)
  • Exact paths match only that specific provider (for example /stripe only matches Stripe)
  • Maximum 10 patterns per array, each up to 100 characters

Example with provenance filtering:

{
"age_thresholds": [18],
"provenance": {
"allowed": ["/veratad/*", "/stripe", "/singpass"],
"denied": ["/veratad/internal"]
}
}

In this example:

  • All Veratad providers are allowed via the /veratad/* wildcard
  • Stripe and Singpass verifications are explicitly allowed
  • Veratad internal verifications are excluded (denied takes precedence over allowed)

Available provenances:

ProvenanceDescription
/connect_idConnect ID verification
/stripeStripe identity verification
/inicisInicis verification (Korea)
/singpassSingpass verification (Singapore)
/privyPrivy verification
/spruce_idSpruce ID verification
/verify_myVerifyMy verification
/privatelyPrivately verification
/veratad/internalVeratad internal verification
/veratad/trinsicVeratad via Trinsic
/veratad/craVeratad via CRA verification
/veratad/rocVeratad via ROC verification

Overrides structure:

FieldTypeRequiredDescription
min_ageintegerNo*Minimum age for facial_age_estimation (required if facial_age_estimation in allowed_methods)
verified_afterstringNoOverride verified_after for this specific method
attributesobjectNoMethod-specific attribute requirements

Example with method and attribute filtering:

{
"age_thresholds": [13, 18],
"allowed_methods": ["id_doc_scan", "payment_card_network"],
"verified_after": "2024-01-01",
"overrides": {
"id_doc_scan": {
"attributes": {
"issuing_country": ["US", "GB"],
"face_match_performed": [true]
}
},
"payment_card_network": {
"attributes": {
"card_type": ["credit_card"]
}
}
}
}

Response

On success, users are redirected to your redirect_uri with an id_token, state, and potentially a code in the URL fragment:

https://yourapp.com/agekey/callback#
id_token=eyJhbGc...long-jwt-string...&
state=abc123xyz789
note

The id_token contains age threshold results and must be validated on your server before trusting the results.

The code is returned when using the agekey_upgrade scope and can be used to upgrade an AgeKey with a new verification.