OAuth2 Provider
Tripsy supports OAuth2 login using Tripsy email/password credentials. This is additive to /auth, /v1/auth, and /auth/apple.
Endpoints
GET /.well-known/oauth-protected-resourceGET /.well-known/oauth-authorization-serverGET /o/authorize/POST /o/token/POST /o/revoke_token/GET /oauth/userinfo
Recommended flow
Use Authorization Code with PKCE.
Users authenticate on Tripsy's existing /login page. New users can use Tripsy's existing /signup page.
Supported scopes
readwriteprofileemail
User info
curl -X GET "https://api.tripsy.app/oauth/userinfo" \
-H "Authorization: Bearer ACCESS_TOKEN"
Success response with profile email scopes:
{
"sub": "6f74c744-6f56-4e3f-87e9-0c883c3db061",
"name": "Example Traveler",
"email": "test@example.com",
"email_verified": true
}
Notes
- Traditional OAuth clients must be registered as OAuth applications before use. To enable OAuth authentication for your integration, contact support@tripsy.app and request OAuth client credentials.
- MCP/OAuth clients without prior registration can use an HTTPS client metadata document URL as
client_idwhen the document includes matchingclient_id,client_name, andredirect_uris. - PKCE is required for authorization-code clients.
emailis only returned by/oauth/userinfowhen the token has theemailscope.