Not recieving the initial code - Jira Cloud OAuth 2 (3LO) code grants

I’m trying to implement the OAuth 2 authentication following this documentation:
https://developer.atlassian.com/cloud/jira/platform/oauth-2-authorization-code-grants-3lo-for-apps/

I am working on Node JS, using ‘request’ for creating the REST requests. For executing the first step in that tutorial I am using the following code:

const options = {
        method: 'GET',
        url: 'https://auth.atlassian.com/authorize',
        qs: {
            audience: 'api.atlassian.com',
            client_id: 'MY_CLIENT_ID',
            scope: 'offline_access read:jira-user read:jira-work write:jira-work',
            redirect_uri: 'SAME_CALLBACK_URI_AS_MY_ATLASSIAN_APP',
            state: 'SOME_HASH_CODE',
            response_type: 'code',
            prompt: 'consent'
        }
    };

    request(options, (error, response, body) => {
        if (error) throw new Error(error);

        console.log(body);
    });

The problem is, that I am not getting redirected to the Atlassian authorization page but instead just getting a weird HTML Code as a response from my request:

<!DOCTYPE html>
<html>
<head>
    <script src="//cdn.auth0.com/js/auth0/8.12.2/auth0.min.js"></script>
</head>
<body>
    <script>
        // standard config decoding as in the default template
        var config = JSON.parse(decodeURIComponent(escape(window.atob('eyJpY29uIjoiIiwiYXNzZXRzVXJsIjoiIiwiYXV0aDBEb21haW4iOiJhdGxhc3NpYW4tYWNjb3VudC1wcm9kLnB1czIuYXV0aDAuY29tIiwiYXV0aDBUZW5hbnQiOiJhdGxhc3NpYW4tYWNjb3VudC1wcm9kIiwiY2xpZW50Q29uZmlndXJhdGlvbkJhc2VVcmwiOiJodHRwczovL2Nkbi5wdXMyLmF1dGgwLmNvbS8iLCJjYWxsYmFja09uTG9jYXRpb25IYXNoIjpmYWxzZSwiY2FsbGJhY2tVUkwiOiJodHRwczovL3VzLWNlbnRyYWwxLWNhcmRzbWl0aC1jb250LmNsb3VkZnVuY3Rpb25zLm5ldC9qaXJhX29hdXRoX2NhbGxiYWNrIiwiY2RuIjoiaHR0cHM6Ly9jZG4uYXV0aDAuY29tLyIsImNsaWVudElEIjoiWFN1WXl2dTROeWY0bE9XZUZ0dlF5QkxEazM4WTZpQVAiLCJkaWN0Ijp7InNpZ25pbiI6eyJ0aXRsZSI6IkNhcmRzbWl0aC1KSVJBLUludGVncmF0b3IifX0sImV4dHJhUGFyYW1zIjp7InByb3RvY29sIjoib2F1dGgyIiwicHJvbXB0IjoiY29uc2VudCIsImF1ZGllbmNlIjoiYXBpLmF0bGFzc2lhbi5jb20iLCJzY29wZSI6Im9mZmxpbmVfYWNjZXNzIHJlYWQ6amlyYS11c2VyIHJlYWQ6amlyYS13b3JrIHdyaXRlOmppcmEtd29yayIsInRlbmFudCI6ImF0bGFzc2lhbi1hY2NvdW50LXByb2QiLCJ0eXBlIjoiY29kZSIsImNsaWVudElEIjoiWFN1WXl2dTROeWY0bE9XZUZ0dlF5QkxEazM4WTZpQVAiLCJyZWRpcmVjdFVSSSI6Imh0dHBzOi8vdXMtY2VudHJhbDEtY2FyZHNtaXRoLWNvbnQuY2xvdWRmdW5jdGlvbnMubmV0L2ppcmFfb2F1dGhfY2FsbGJhY2siLCJfY3NyZiI6Ik9XdXF0dW96LWx2WERucnVRSXdNMjdIcFFnWWVSbms4aXFONCIsIl9pbnRzdGF0ZSI6ImRlcHJlY2F0ZWQiLCJzdGF0ZSI6Imc2Rm8yU0F3TUVsS1ozWTFWbTl1VFhocU4wcHZNRXhtUm1sZmJrVldVMEl3Tms5ZlRxTjBhV1RaSUdSb01VbDFWMHAwWldoa01EWlpWbDgwVW14NmMzQkRkSGxHYWw5U0xYVkNvMk5wWk5rZ1dGTjFXWGwyZFRST2VXWTBiRTlYWlVaMGRsRjVRa3hFYXpNNFdUWnBRVkEifSwiaW50ZXJuYWxPcHRpb25zIjp7InByb3RvY29sIjoib2F1dGgyIiwicHJvbXB0IjoiY29uc2VudCIsImF1ZGllbmNlIjoiYXBpLmF0bGFzc2lhbi5jb20iLCJzY29wZSI6Im9mZmxpbmVfYWNjZXNzIHJlYWQ6amlyYS11c2VyIHJlYWQ6amlyYS13b3JrIHdyaXRlOmppcmEtd29yayIsInRlbmFudCI6ImF0bGFzc2lhbi1hY2NvdW50LXByb2QiLCJ0eXBlIjoiY29kZSIsImNsaWVudElEIjoiWFN1WXl2dTROeWY0bE9XZUZ0dlF5QkxEazM4WTZpQVAiLCJyZWRpcmVjdFVSSSI6Imh0dHBzOi8vdXMtY2VudHJhbDEtY2FyZHNtaXRoLWNvbnQuY2xvdWRmdW5jdGlvbnMubmV0L2ppcmFfb2F1dGhfY2FsbGJhY2siLCJfY3NyZiI6Ik9XdXF0dW96LWx2WERucnVRSXdNMjdIcFFnWWVSbms4aXFONCIsIl9pbnRzdGF0ZSI6ImRlcHJlY2F0ZWQiLCJzdGF0ZSI6Imc2Rm8yU0F3TUVsS1ozWTFWbTl1VFhocU4wcHZNRXhtUm1sZmJrVldVMEl3Tms5ZlRxTjBhV1RaSUdSb01VbDFWMHAwWldoa01EWlpWbDgwVW14NmMzQkRkSGxHYWw5U0xYVkNvMk5wWk5rZ1dGTjFXWGwyZFRST2VXWTBiRTlYWlVaMGRsRjVRa3hFYXpNNFdUWnBRVkEifSwicHJvbXB0Ijp0cnVlLCJ3aWRnZXRVcmwiOiJodHRwczovL2Nkbi5hdXRoMC5jb20vdzIvYXV0aDAtd2lkZ2V0LTUuMS5taW4uanMiLCJpc1RoaXJkUGFydHlDbGllbnQiOnRydWUsImF1dGhvcml6YXRpb25TZXJ2ZXIiOnsidXJsIjoiaHR0cHM6Ly9hdXRoLmF0bGFzc2lhbi5jb20iLCJpc3N1ZXIiOiJodHRwczovL2F0bGFzc2lhbi1hY2NvdW50LXByb2QucHVzMi5hdXRoMC5jb20vIn0sImNvbG9ycyI6e319'))));

        // When CNAME is used, config.authorizationServer points to the CNAME auth0 domain.
        var auth0ServerDomain = config.authorizationServer ? config.authorizationServer.url.replace('https://', '') : config.auth0Domain;

        // builds an Auth0.js instance using config options
        var authClient = new auth0.Authentication({
            domain: auth0ServerDomain,
            clientID: config.clientID,
            _disableDeprecationWarnings: true,
            redirectUri: config.callbackURL,
            responseType: config.extraParams.response_type || config.callbackOnLocationHash ? 'token' : 'code'
        });

        function buildDirectAuthUrl(connectionName) {
            var options = {};
            if (config.internalOptions) {
                options = config.internalOptions
            }
            options.connection = connectionName;

            return authClient.buildAuthorizeUrl(options);
        }

        location.href = buildDirectAuthUrl(config.dict.signin.title === 'auth0-delegated-admin-spa' ? 'centrify' : 'oidc-session-bridge');
    </script>
</body>
</html>

Am I missing something important in the construction of my request?
Any help or comment will be welcome. Thanks in advance.