Requirements

  • An account in OKTA
  • API_URL is the public DNS name of the hoop gateway instance

Contact the administrator of the hoop gateway instance to retrieve the API_URL address.

Identity Provider Configuration

1

Create an Application

  • Go to Applications > Applications and click on the Create App Integration button
  • In Sign-in Method, select OIDC - OpenID Connect
  • In Application type, select Web Application
2

Configure the Redirect URIs

  • Signin redirect URIs: {API_URL}/api/callback
  • Signout redirect URIs: {API_URL}/api/logout
3

Collect the Credentials

  • In the Application Home copy the Client ID and Client Secret
4

Collect Issuer Information

  • The Issuer URI depends on the authorization server being used. Refer to this documentation.

If Okta does not allow external applications to validate access tokens, add the query string option _userinfo=1 when configuring the Gateway. It indicates to use the user info endpoint. The _userinfo value is removed when used to exchange information with the identity provider.

5

Configure Groups Claims

  • Go to Security > API > {authorization server} > Claims
  • Add https://app.hoop.dev/groups in the ID Token

If the above instructions are not applicable to your Okta setup, configure it by adding a group claim to the organization’s authorization server. Refer to this documentation.