Central Auth Gateway
The Central Auth Gateway is the canonical authentication entry for all LanOnasis clients and services. It standardizes OAuth (Device Flow and PKCE) and enforces project-scoped access across the platform.
Endpoints
Primary entry points (use either based on client environment and routing proximity):
https://auth.lanonasis.com/v1/...https://api.lanonasis.com/v1/auth/...
Typical OAuth routes (representative):
- Device Flow initiation and polling
- PKCE authorization and token exchange
- Session and token lifecycle routes
Exact route shapes and headers are guaranteed by the gateway. Prefer the OAuth flows over direct API keys wherever possible.
Which clients use which flow
- CLI / IDE extensions / MCP-integrated agents: Device Flow (user-friendly, headless-safe), backed by PKCE.
- Web dashboards and first‑party apps: PKCE in browser contexts.
- Service-to-service: short‑lived, scoped tokens via the gateway; avoid long‑lived static keys.
- Raw API keys: legacy/limited; only where explicitly documented and scoped. Plan upgrades to OAuth.
Environment and configuration
- Use the documented base URLs above.
- Configure per‑project environment variables as described in the operator guide (see Operating the Platform).
- Never expose service_role credentials to frontends.
Security posture
- Requests are verified with project‑scoped JWT claims and audited centrally.
- Row‑Level Security remains enforced at the database layer.
- Rate limiting and abuse protections are applied at the gateway.
Migration guidance
If you are using raw API keys in older integrations:
- Prefer Device Flow for CLI/IDE/MCP clients and PKCE for web apps.
- Review deprecations and upgrade steps in Changelog & Migration.
Related docs
- Platform map: Architecture & Domains
- MCP integration: Production MCP Server
- Security & privacy: Implementation Overview