Policies

Okta JWT Auth Policy

Authenticate requests with JWT tokens issued by Okta. This is a customized version of the OpenId JWT Policy specifically for Okta.

See this document for more information about OAuth authorization in Zuplo.

Configuration

The configuration shows how to configure the policy in the 'policies.json' document.

{ "name": "my-okta-jwt-auth-inbound-policy", "policyType": "okta-jwt-auth-inbound", "handler": { "export": "OktaJwtInboundPolicy", "module": "$import(@zuplo/runtime)", "options": { "allowUnauthenticatedRequests": false, "audience": "api://my-api", "issuerUrl": "https://dev-12345.okta.com/oauth2/abc" } } }

Policy Options

The options for this policy are specified below. All properties are optional unless specifically marked as required.

  • allowUnauthenticatedRequests <boolean> -
    Allow unauthenticated requests to proceed. This is use useful if you want to use multiple authentication policies or if you want to allow both authenticated and non-authenticated traffic.
    Defaults to false.
  • issuerUrl <string> (Required) -
    Your Okta authorization server's issuer URL. For example, https://dev-12345.okta.com/oauth2/abc.
  • audience <string> -
    The Okta audience of your API, for example api://my-api.

Using the Policy

Read more about how policies work

Previous
Firebase JWT Auth