logo

Okta

This guide explain how to configure Okta with Hoop.

Requirements

  • Hoop Command Line
  • API_URL is the public DNS name of the hoop gateway instance
Contact the administrator of the hoop gateway instance to retrieve the API_URL address.

Identity Provider Configuration

  • Login with your account at https://developer.okta.com/login/

1) Create a new application

  • Go to Applications > Applications and click on the Create App Integration button
  • In Sign-in Method, select OIDC - OpenID Connect
  • In Application type, select Web Application

2) Configure the redirect URIs

  • Signin redirect URIs: {API_URL}/api/callback
  • Signout redirect URIs: {API_URL}/api/logout
Image without caption
  • Save the Application

3) Collect the required information

IDP_CLIENT_ID & IDP_CLIENT_SECRET

In the Application Home
Image without caption

IDP_ISSUER

The Issuer URI depends on the authorization server being used. For more information, refer to this documentation.
If Okta does not have the ability to allow external applications to validate access tokens, make sure to add the query string _userinfo=1. This indicates that the userinfo endpoint should be used.
bash
IDP_ISSUER=https://${yourOktaOrg}?_userinfo=1
the _userinfo value is removed when it's used to exchange information with the identity provider.

4) Add ‘https://app.hoop.dev/groups’ claim to ID Token (optional)

  • Go to Security > API > {authorization server} > Claims
  • Add https://app.hoop.dev/groups in the ID Token