How to integrate Okta with AWS API Gateway JWT Authorizer?

preview_player
Показать описание
This video explains how to generate a JWT Access Token using Okta and use that token to Authorize API endpoints hosted in AWS API Gateway.

#aws #amazonwebservices #openid #okta #authentication #iam #identity #apigateway #api #security
Рекомендации по теме
Комментарии
Автор

if anyone is getting "The DPoP proof JWT header is missing" error in postman, go to the application you created in OKTA -> general settings and deselect "Proof of possession" option.

rakeshmallya
Автор

Very useful.. Thanks a lot!! How would you integrate with an enterprise application using saml sso which requires to query an AWS Redshift behinds an AWS API Gateway with Okta?? The browser of the client(power bi) is already using a claim and the idea is to query a data warehouse (okta is storing the ClientID, secretID) without re-authenticate the users ??

bruxelleskarim
Автор

Doesn't this technically use custom authorization servers, which are a paid feature as part of the "API Access Management" package in a prod environment?

Is there any way to do this or something similar without buying add-ons?

brandonellis
Автор

Hi, any idea how to get the token if the Okta app is "OIDC - OpenID Connect" instead of "API Services"? We only have access to OIDC app and it seems the token is not being passed back to the API Gateway. Thank you

kexray
Автор

Hi, Could u plz let me know if we can cache this token somehow and reduce the no of hits to okta for validation till the token is valid.?

priyankhananthini
Автор

How do you integrate with spa and take that token and validate it in Gateway?

karthikdurais
Автор

how add other scopes like jwtreadt to the jwt token generated?

qosjkmy
Автор

I believe the api gateway layout does not allow this jwt token option anymore

csoutsource