tyk_analytics.conf
and make sure that a proper oauth_redirect_uri_separator
parameter is set. You may use the following value:
/v1/keys
suffix, e.g. https://tyk-testing.okta.com/oauth2/default/v1/keys
."sub"
and for Policy Field Name use "pol"
.
https://tyk-testing.okta.com/
Client Registration Endpoint: OpenID Connect client registration endpoint. The value we use is https://tyk-testing.okta.com/oauth2/v1/clients
This value is found in your well-known discovery document as registration_endpoint
. The well-known location URL is typically https://tyk-testing.okta.com/.well-known/openid-configuration
(replace “tyk-testing” with your org.).
Initial Registration Access Token: the token that’s used to register new clients, this was generated in the early steps of the guide.
"application_type"
, the application types aren’t standard across all IDPs, while the initial specification mentions "native"
or "web"
types, some IDPs implement their own. In the current implementation Tyk supports the usage of the "web"
application type which is necessary in supporting the client credentials flow that’s described in this guide, as well as others, this is set automatically when OKTA is set as the provider. Currently, the ability to change the application type is available with the Enterprise Developer Portal.https://[org].okta.com/oauth2/default/v1/token
Your Postman request should contain the following body, where "client_id"
and "client_secret"
are the credentials you got from the developer portal:
"tyk"
scope as value.
Once we get a response from the IDP, we can copy the "access_token"
and use it to access our OKTA API, this request will be proxied by Tyk: