Language

Staff sign-in surface

Narrow auth-first shell for protected admin access.

This first release only proves sign-in, backend bootstrap, role-aware gating, and logout. It does not ship broader admin modules.

Public entry

Dedicated login route for staff users only

Bootstrap source

GET /api/v1/admin-auth/me after OIDC sign-in

Protected exit

POST /api/v1/logout before returning to public state

OpenMedical Admin Portal

Start ZITADEL OIDC sign-in, then let the backend confirm whether the caller is allowed to open the admin shell.

Admin Portal

The protected admin bootstrap request is sent to this origin after OIDC returns.

This public client id is used for the PKCE authorize and token exchange flow.

Admin MFA remains enforced in ZITADEL. This frontend only initiates the flow and then consumes the existing protected backend contracts.