Okta JWT Auth
Authenticate requests with JWT tokens issued by Okta. This is a customized version of the OpenId JWT Policy specifically for Okta.
See this document for more information about OAuth authorization in Zuplo.
Configuration#
{
"name": "my-okta-jwt-auth-inbound-policy",
"policyType": "okta-jwt-auth-inbound",
"handler": {
"export": "OktaJwtInboundPolicy",
"module": "$import(@zuplo/runtime)",
"options": {
"allowUnauthenticatedRequests": false,
"issuerUrl": "$env(OKTA_ISSUER_URL)",
"audience": "$env(OKTA_AUDIENCE)"
}
}
}
Options#
name
the name of your policy instance. This is used as a reference in your routes.policyType
the identifier of the policy. This is used by the Zuplo UI. Value should beokta-jwt-auth-inbound
.handler/export
The name of the exported type. Value should beOktaJwtInboundPolicy
.handler/module
the module containing the policy. Value should be$import(@zuplo/runtime)
.handler/options
The options for this policy:allowUnauthenticatedRequests
Allow unauthenticated requests to proceed. This is use useful if you want to use multiple authentication policies or if you want to allow both authenticated and non-authenticated traffic.
issuerUrl
Your Okta authorization server's issuer URL. For example, https://dev-12345.okta.com/oauth2/abc
audience
The Okta audience of your API, for example api://my-api