Okta
Requirements
- An account in OKTA
API_URL
is the public DNS name of the hoop gateway instance
Contact the administrator of the hoop gateway instance to retrieve the API_URL
address.
Identity Provider Configuration
Create an Application
- Go to
Applications > Applications
and click on the Create App Integration button - In Sign-in Method, select OIDC - OpenID Connect
- In Application type, select Web Application
Configure the Redirect URIs
- Signin redirect URIs:
{API_URL}/api/callback
- Signout redirect URIs:
{API_URL}/api/logout
Collect the Credentials
- In the Application Home copy the Client ID and Client Secret
Collect Issuer Information
- The Issuer URI depends on the authorization server being used. Refer to this documentation.
If Okta does not allow external applications to validate access tokens, add the query string option _userinfo=1
when configuring the Gateway. It indicates to use the user info endpoint.
The _userinfo value is removed when used to exchange information with the identity provider.
Configuring Groups
Explains how to configure groups claim to propagate when users sign in.
Refer to Okta’s Documentation for more information.
Add Groups Claims
- Go to
Security > API > {authorization server} > Claims
- Click on
Add Claims
button
Add the groups
claim for the ID Token to any scope (image below)
Token Preview Test
This step validate if the configuration is returning the groups
claim properly
- Go to
Token Preview
tab - Select the Hoop Application
- Select the Grant Type as
Authorization Code
- Select a user associated with this application
- Add the scope
openid
The payload must appear with a claim named groups
containing the groups associated with your application (image below)
Please note that the groups
claim will not be present when a user has no group assignments.
Hoop synchronizes group information only when this attribute is configured.
To prevent potential issues, ensure each user is assigned to at least one default group.
Configure Hoop Gateway
The Hoop gateway requires proper configuration to correctly map claim names for synchronization. For detailed instructions, please consult the OAuth2/OIDC Authentication Documentation