Integrations
This tutorial demonstrates how to integrate Criipto Verify with Okta
This tutorial demonstrates how to integrate Criipto Verify with Okta. The following steps are required to complete your first login:
In the following you will be configuring first Criipto Verify, then Okta. Once configured you may test that everything works from Okta.
The setup requires a bit of switching back-and-forth between Criipto and Okta's respective management dashboards, so we recommend that you have them open simultaneously to make the process really smooth.
Before you get started, you will need the following information:
https://your-company-name.okta.com/oauth2/v1/authorize/callback, but check your Okta settings to make sure. We have used criipto-samples as a replacement for your-company-name in this tutorial.post_logout_redirect_url for your Okta tenant.First, you must register your Okta tenant as an application in Criipto Verify.
Once you register your Okta tenant, you will also need some of the information for configuring Okta to communicate with Criipto Verify. You get these details from the settings of the application in the dashboard.
Specifically you need the following information to integrate with Okta:
urn:criipto:verifysamples.criipto.id
If you plan on using single-signon, you must also register your Okta post_logout_redirect_url here so you can run single-logouts.
If you are registering a new application, please save the initial configuration first.
After saving, you can configure the OAuth2 Code Flow for this application by following the three steps:
plainJson to enable retrieval of plain JSON user information from the /oauth2/userinfo endpoint.
Note that some libraries do not support the final userinfo request. In those cases, you will need to fetch the user data directly from the token endpoint as opposed to the userinfo endpoint. You can do this by choosing fromTokenEndpoint as a User info response strategy.
Criipto Verify supports four modes for retrieving user information:
plainJson): User information is returned from the userinfo endpoint as a standard JSON object.signedJwt): User information is returned from the userinfo endpoint as a digitally signed JSON Web Token.signedAndEncryptedJwt): User information is returned from the userinfo endpoint as a signed and encrypted JSON Web Encryption(JWE) object.token endpoint, embedded in the id_token (fromTokenEndpoint). The fromTokenEndpoint flow is not standard, but can be useful if you are working with a product that does not call the userinfo endpoint.Make sure you are in Classic UI mode, and click on the Security -> Identity Providers item.
and click on the Add Identity Provider button, select OIDC for protocol.
Select Add OpenID Connect IdP
Fill in the form with values for you Criipto Verify application, similar to the following example
Given the values above, and assuming that your Criipto Verify domain is acme-corp.criipto.id you must add
urn:criipto:verify (if you have set a different value in your Criipto Verify Client ID/Realm, use that value instead here - they must match)OAuth code flow setupopenid will sufficehttps://acme-corp.criipto.idhttps://acme-corp.criipto.id/oauth2/authorize?acr_values=urn:grn:authn:se:bankidhttps://acme-corp.criipto.id/oauth2/tokenhttps://acme-corp.criipto.id/.well-known/jwksThe Name is entirely up to you, and you don't have to specify the optional Userinfo endpoint if you at the same time ensure that you configure your Criipto Verify application to use fromTokenEndpoint in the User info response strategy dropdown.
This setup assumes you are looking to authenticate your users with the Swedish BankID. If you have other needs, replace the value of the acr_values parametery in the Authorization endpoint, or set up several Identity Providers in your Okta tenant - see below for a list of all supported values.
Criipto Verify supports a range of country and bank specific eID services. They are all accessed through the same endpoints, e.g. https://<YOUR COMPANY>.criipto.id/oauth2/authorize
To pick the login method you must set the acr_values parameter on the authentication request in order to choose the type of authentication you want. How you set this query string parameter varies with programming platform and your OpenID Connect library of choice.
The current list of possible values is:
| Login method | acr_values |
|---|---|
| Norwegian BankID | |
| Mobile or Web (user choice): | urn:grn:authn:no:bankid |
| Norwegian Vipps Login | |
| Login with Vipps app: | urn:grn:authn:no:vipps |
| Swedish BankID | |
| All options (user chooses): | urn:grn:authn:se:bankid |
| Same device: | urn:grn:authn:se:bankid:same-device |
| Another device (aka mobile): | urn:grn:authn:se:bankid:another-device |
| QR code: | urn:grn:authn:se:bankid:another-device:qr |
| Danish MitID | |
| Level low: | urn:grn:authn:dk:mitid:low |
| Level substantial: | urn:grn:authn:dk:mitid:substantial |
| MitID Erhverv (MitID Business): | urn:grn:authn:dk:mitid:business |
| Finnish Trust Network | |
| BankID: | urn:grn:authn:fi:bank-id |
| Mobile certificate (Mobiilivarmenne): | urn:grn:authn:fi:mobile-id |
| Both of the above: | urn:grn:authn:fi:all |
You can find more details here
Most eIDs distinguish between real users and test users.
Real users represent actual individuals who authenticate on your website, providing real personal information such as their name and typically a Social Security Number (SSN).
Test users are fictitious identities used for development and testing. Depending on the eID, you can either create your own test users or use pre-existing ones provided by Criipto.
For instructions on creating test users for each eID, please refer to Test user guides.
How to integrate your application with Okta depends on the technology you are working with. Refer to the Okta developer documentation for more details.