Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authentication Directly with Custom Auth Provider (Okta) #12742

Open
2 tasks
oconpa opened this issue Dec 21, 2023 · 4 comments
Open
2 tasks

Authentication Directly with Custom Auth Provider (Okta) #12742

oconpa opened this issue Dec 21, 2023 · 4 comments
Assignees
Labels
Auth Related to Auth components/category documentation Related to documentation feature requests feature-request Request a new feature need-product-input Needs non-technical requirements or direction to proceed VP Version parity issues between v5 and v6

Comments

@oconpa
Copy link

oconpa commented Dec 21, 2023

Is this related to a new or existing framework?

React

Is this related to a new or existing API?

Authentication

Is this related to another service?

AppSync API Authentication

Describe the feature you'd like to request

Can we introduce an ability in amplify V6 to authenticate directly to a custom authentication provider; without passing through a Cognito User Pool. This feature was possible in v5, I have worked with customers using this in the production loads and would like to see it continued in Amplify V6.

Feedback on it's current setup in v6 is that usage of Cognito would mean customers can find themselves in a out of sync system, where users are removed from the Okta platform, however exist until removed on user pools connected. This way they would like that all systems authenticate directly to Okta.

Describe the solution you'd like

In Amplify v5 this was achieved through the lower excerpt of code configured in the aws-config.ts, which is passed to Amplify.Configure().

# Amplify V5

const awsconfig = {
  oauth: {
    WebDomain: "xxxxxxxxxxx.okta-<region>.com",
    FederationTarget: "okta",
  },
  aws_appsync_graphqlEndpoint: `${process.env.REACT_APP_APPSYNCAPI}`,
  aws_appsync_region: `${process.env.REACT_APP_REGION}`,
  ...
};

I would suggest duplicating this feature in the newer Amplify V6 in the following format:

# Amplify V6

Amplify.configure({
  Auth: {
    Cognito: {...},
    Custom: {
      OAuth: {
        WebDomain: "xxxxxxxxxxx.okta-<region>.com",
        FederationTarget: "okta",
      },
    },
  },
});

Describe alternatives you've considered

Without this ability customers running workloads either remain on v5, or look to migrate away from Amplify in favor of a custom framework which allows them to directly authenticate with their chosen authentication framework. It's a blocker in using Amplify if it's fixed for Cognito usage.

Additional context

No response

Is this something that you'd be interested in working on?

  • 👋 I may be able to implement this feature request
  • ⚠️ This feature might incur a breaking change
@oconpa oconpa added the pending-triage Issue is pending triage label Dec 21, 2023
@cwomack cwomack self-assigned this Dec 21, 2023
@cwomack cwomack added Auth Related to Auth components/category investigating This issue is being investigated and removed pending-triage Issue is pending triage labels Dec 21, 2023
@e-mar-para
Copy link

We are currently using v5 and would like to upgrade to v6, but this is blocking us since our company requires Okta auth. Thanks.

@israx
Copy link
Member

israx commented Dec 21, 2023

Amplify v6 allows to federate to an identity pool with a idp. You would need to create a custom credentials provider. You can review this section

@cwomack
Copy link
Member

cwomack commented Dec 22, 2023

@oconpa and @e-mar-para, let us know if the guidance and docs link provided above help resolve the issue with getting Okta integrated and used as your custom Auth provider. Depending on how you're looking to configure Auth, you may also need to use additional fields within the scoped configuration. Let us know if there are additional questions or issues!

@cwomack cwomack added question General question pending-response and removed investigating This issue is being investigated labels Dec 22, 2023
@oconpa
Copy link
Author

oconpa commented Dec 25, 2023

I think it would be highly beneficial to see here or in the docs an example of this specific use case migrated from Amplify V5 to V6. Much of the authentication processing behind the scenes if not presented on glance from the Amplify.configure step:

oauth: {
    WebDomain: "xxxxxxxxxxx.okta-<region>.com",
    FederationTarget: "okta",
},

Could you provide an example of how one would migrate from this step into the setup of a basic okta application using the custom step presented above?

@cwomack cwomack added documentation Related to documentation feature requests need-product-input Needs non-technical requirements or direction to proceed and removed question General question labels May 13, 2024
@haverchuck haverchuck added the VP Version parity issues between v5 and v6 label Jun 24, 2024
@jimblanc jimblanc added the feature-request Request a new feature label Oct 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Auth Related to Auth components/category documentation Related to documentation feature requests feature-request Request a new feature need-product-input Needs non-technical requirements or direction to proceed VP Version parity issues between v5 and v6
Projects
None yet
Development

No branches or pull requests

6 participants