Ozone

Open Finance Malaysia Developer Portal

Section 2: Discovering OFP Endpoints via Well-Known

The well-known endpoint is your starting point for discovering the OFP's Authorization Server configuration, including all critical endpoint URLs you'll use throughout the API interaction.


Overview

The OpenID Connect discovery standard provides a well-known endpoint that returns the Authorization Server's configuration. This tells you where to send authorization requests, token requests, and how to access other critical endpoints.


Call the Well-Known Endpoint

What is the Well-Known Endpoint?

The well-known endpoint follows the OpenID Connect discovery standard and returns configuration information about the OFP's Authorization Server.

Making the Request

Endpoint:

GET https://{{AS_URL}}/.well-known/openid-configuration

Transport Security: TLS only (no mTLS required)

Headers:

  • No authentication required for this public endpoint
  • Standard HTTP headers (Accept: application/json)

Example cURL Request:

curl -X GET "https://{{AS_URL}}/.well-known/openid-configuration" \
  -H "Accept: application/json"

Understanding the Response

The response contains critical URLs and configuration you'll use throughout your API interactions. Key fields:

FieldPurposeNotes
issuerIdentity of the OFP Authorization ServerMust match the iss claim in authorization responses
authorization_endpointURL to send user for consent authorizationUsed in authorization code flow
token_endpointURL to exchange authorization code for tokensAcquires access tokens and ID tokens
pushed_authorization_request_endpointURL for submitting Pushed Authorization RequestsRequired before authorization flow (FAPI 2.0 mandate)
userinfo_endpointURL to retrieve authenticated user informationReturns claims about the user
introspection_endpointURL to check token validityValidate token status
revocation_endpointURL to revoke tokens and consentsRevoke consent or tokens
jwks_uriURL to retrieve OFP's public keysUsed for signature verification
mtls_endpoint_aliasesmTLS versions of sensitive endpointsUse for certificate-based authentication

Store these URLs in your application or Postman environment. You'll reference them in subsequent sections.

Important Notes on Well-Known Response

  • require_pushed_authorization_requests will be true - all authorization requests must use PAR
  • response_types_supported will be ["code"] - only authorization code flow is supported
  • code_challenge_methods_supported will be ["S256"] - PKCE with SHA256 is required
  • scopes_supported includes openid and accounts

Next Steps

You now have the OFP endpoint URLs. Proceed to:



Powered by ozoneapi

© 2026 Open Finance Malaysia Developer Portal. All rights reserved.