client_id
+ secret
that are defined on your IDPCallback URL
generated by Tyk on your IDPDiscover URL (well known endpoint)
http://localhost:3000/auth/{PROFILE-NAME-IN-TIB}/openid-connect/callback
.http://localhost:3000/auth/{PROFILE-NAME-IN-TIB}/openid-connect
https://<okta-org>.okta.com/.well-known/openid-configuration
Application
, click Add Application
Web
Authorization Code
Done
Developer Console
, for the Classic UI
instructions are slightly different.
General
, click Edit
and update the Login redirect URIs
field with the endpoint on TIB http://localhost:3010/auth/{PROFILE-NAME-IN-TIB}/openid-connect/callback
.{PROFILE-NAME-IN-TIB}
- this can be any string you choose, as long as you use the same one for the profile in TIB.Assignments
tab, make sure group assignments is set to everyone (for now, you will change this later!).
profiles.json
as follows:
cliend ID
to ProviderConfig.UseProviders[].key
Client secret
to ProviderConfig.UseProviders[].secret
"https://<okta-org>.okta.com/.well-known/openid-configuration"
to ProviderConfig.UseProviders[].DiscoverURL
profiles.json
file:
profiles.json
is in the same CWD)
See Install TIB for detailed instructions on how to install TIBhttp://localhost:3010/auth/{PROFILE-NAME-IN-TIB}/openid-connect
/tap
( it was defined on the profile under ReturnURL
) with the nonce that was created./tap
endpoint finds the session that is attached to the nonce
, login the user and redirect to the dashboard first pageuser
and password
tyk_analytics.conf
to redirect logins to that url
Explicit details are in steps 6-7Security --> Multifactor --> Factor types
you can choose the types you want. For instance I chose Google Authenticator.
400 Bad Request
it means the profile name in the login endpoint is not identical to the profile name in the callback that you set up on Okta’s app:
Login redirect URIs:
http://localhost:3010/auth/{PROFILE-NAME-IN-TIB}/openid-connect/callback
.http://localhost:3010/auth/{PROFILE-NAME-IN-TIB}/openid-connect
<<your-auth0-domain>>
with the Domain value from your Auth0 application > Basic Information.
https://<<your-auth0-domain>>/.well-known/openid-configuration
https://<your-keycloak-host-and-realm>/.well-known/openid-configuration
.
This is accessible from “Realm Settings” > “General” Tab > OpenID Endpoint Configuration. You will need it in later steps.
ProviderConfig
section:PrivateKeyLocation
to either: