You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This bug report is related to okta/okta-oidc-js#978 in that both are demonstrating issues when working with Organization Auth Servers and are caused by the same url path issue.
Current behavior
It seems like the oidc-middleware cannot work with Okta Org Auth Servers.
After entering credentials, the request results in a 404 due to bad string concatenation in createLoginHandler when redirecting to the authorization_endpoint.
For Org Auth Servers, the issuer is https://${yourOktaOrg} (note that it doesn't include /oauth2).
Making a request to https://${yourOktaOrg}/.well-known/openid-configuration yields
That the oidc-middleware work with Okta Org Auth Servers. Perhaps it should use the authorization_endpoint that is returned by /.well-known/openid-configuration rather than doing its own string concatenation.
Minimal reproduction of the problem with instructions
Configure oidc middleware with issuer from organization auth server
Extra information about the use case/user story you are trying to implement
It is a simple use case, trying to integrate an app using oidc with the Organization Auth Server that came with out Okta instance.
Environment
Package Version: 4.2.0
OS: macOS BigSur 11.6
Node version (node -v): v12.22.1
The text was updated successfully, but these errors were encountered:
I'm submitting this issue for the package(s):
I'm submitting a:
This bug report is related to okta/okta-oidc-js#978 in that both are demonstrating issues when working with Organization Auth Servers and are caused by the same url path issue.
Current behavior
It seems like the oidc-middleware cannot work with Okta Org Auth Servers.
After entering credentials, the request results in a 404 due to bad string concatenation in
createLoginHandler
when redirecting to theauthorization_endpoint
.For Org Auth Servers, the issuer is
https://${yourOktaOrg}
(note that it doesn't include/oauth2
).Making a request to
https://${yourOktaOrg}/.well-known/openid-configuration
yields(truncated for brevity)
However,
createLoginHandler
redirects tohttps://${yourOktaOrg}/v1/authorize
Expected behavior
That the oidc-middleware work with Okta Org Auth Servers. Perhaps it should use the
authorization_endpoint
that is returned by/.well-known/openid-configuration
rather than doing its own string concatenation.Minimal reproduction of the problem with instructions
Configure oidc middleware with issuer from organization auth server
Extra information about the use case/user story you are trying to implement
It is a simple use case, trying to integrate an app using oidc with the Organization Auth Server that came with out Okta instance.
Environment
node -v
): v12.22.1The text was updated successfully, but these errors were encountered: