A Guide to Integrating Norwegian BankID with Okta

As more businesses move their operations online, it’s essential to ensure that only authorized personnel can access sensitive data and systems. That’s where identity management solutions come in. Okta is a well-known identity management solution that provides a single platform for handling user identities and access to applications. 

But in some cases, organizations may want to provide users with additional authentication methods, such as national eIDs. Criipto Verify enables authentication via a number of eIDs, including the new Norwegian BankID with biometrics.

In today’s blog post, we’ll take a look at integrating Okta with Norwegian BankID via Criipto. We’ll also showcase the effortless login experience made possible by the new Norwegian BankID.

Integrating Norwegian BankID with Okta through Criipto Verify

When you add an external Identity Provider to Okta, Okta acts as an intermediary between your application and the Identity Provider that verifies your users' identities. This lets your users log in to your application using their credentials from that specific Identity Provider.

eID integration with Criipto Verify through Okta

We’ll add a Norwegian BankID connection to Okta to give end users the option to use their national eID for authentication. The login flow will start with Okta, and the user will be able to choose to log in with their Norwegian BankID. They’ll be redirected for authentication and complete the login process with their BankID app. After successful authentication, a user account will be created in Okta, and the user will be sent back to your application along with an ID token.

Using Criipto to integrate Norwegian BankID with Okta requires the following 4 steps:

  1. Register your Okta tenant in Criipto Verify
  2. Configure OAuth2 flow in Criipto Verify
  3. Create Criipto Verify identity provider in Okta
  4. Integrate your application with Okta

If you want to follow along, we recommend having both Criipto and Okta's management dashboards open simultaneously, as the setup requires some switching between the two.

Prerequisites

Before you get started, you’ll need the following information from Okta:

  • The callback URL for your Okta tenant. This will depend on the DNS name you use in Okta for running your logins. The value may look something like https://your-company-name.okta.com/oauth2/v1/authorize/callback, but check your Okta settings to make sure.
  • [Optional] The post_logout_redirect_url for your Okta tenant.

1. Register your Okta tenant in Criipto Verify

First, register your Okta tenant as an application in Criipto Verify.

Once registered, you’ll need to retrieve some information from the application settings in the Criipto dashboard. You’ll need the following details to integrate with Okta:

  • Client ID to identify your Okta tenant to Criipto Verify. We chose  urn:criipto:verify:bankid
  • Domain on which you will communicate with Criipto Verify. It can be for example, your-company-name.criipto.id. We'll use cool-energy-test.criipto.id as an example.
  • Client secret which Okta needs to fetch the actual user information from Criipto Verify during login. The secret is generated and copied as described further down.

new-app-at-criipto

If you plan to use single sign-on (SSO), you should also register your Okta post_logout_redirect_url here in order to run single logouts.

2. Configure the OAuth2 code flow

Once you save your application, follow these steps to configure the OAuth2 code flow:

  1. Enable OAuth2 code flow.
  2. Copy the generated client secret.
  3. Set the user info response strategy to plainJson to enable retrieval of plain JSON user information from the /oauth2/userinfo endpoint.

User info response strategy

* Please note that this is the only time you’ll see the actual value of the client secret. Criipto stores the secret as a hashed value, so you cannot retrieve it after it has been generated and stored.

secret

3. Create Criipto Verify identity provider in Okta

  1. From Okta dashboard, go to Security > Identity Providers.
  2. Click Add Identity Provider and select OpenID Connect IdP.
  3. Fill in the form values to configure the OpenID Connect IdP (see the example below).

image2

Assuming that your Criipto Verify domain is cool-energy-test.criipto.id, you should add:

  1. The Name in the General Settings is entirely up to you. We chose Criipto Verify - Norwegian BankID.
  2. Scopes: openid will suffice.
  3. Client ID is the Client ID/Realm from the Criipto Verify application you created in Step 1. In our case, urn:criipto:verify:bankid
  4. Client Secret is the secret generated by Criipto Verify during the OAuth code flow setup.
  5. Issuer: https://cool-energy-test.criipto.id
  6. Authorization endpoint: https://cool-energy-test.criipto.id/oauth2/authorize?acr_values=urn:grn:authn:no:bankid:substantial
  7. Token endpoint: https://cool-energy-test.criipto.id/oauth2/token
  8. JWKS endpoint: https://cool-energy-test.criipto.id/.well-known/jwks
  9. Userinfo endpoint: https://cool-energy-test.criipto.id/oauth2/userinfo

Notice that we have provided acr_values for Norwegian BankID in the Authorization endpoint URL. If you’re setting up multiple eIDs, you’ll need to create a new OIDC Identity Provider with the corresponding acr_values for each of them. 

You can find the list of supported eIDs and their corresponding acr_values in our documentation.

4. Integrate your application with Okta

The method of integrating your application with Okta depends on the technology you are working with. For detailed instructions, please refer to the Okta developer documentation.

To quickly test the integration, we used this sample React application provided by Okta. The Okta-hosted login example in combination with the Routing rule configured from Okta dashboard and appropriate claims mapping let us simulate the login flow and verify that the integration was successful.

Watch a video demonstration of the login flow below:

 

Summing-up

Integrating Norwegian BankID with Okta through Criipto offers organizations a simple and secure way to provide users with an additional authentication method. It can enhance the security of enterprise resources, simplify the login process for users, and help you comply with local regulations.

If you have any questions about the integration process or need further assistance, please don't hesitate to contact our support team on Slack or by email – we’re here to help!

Author
Our blog

Latest blog posts

The latest industry news, interviews, technologies, and resources.

An Introduction to Client Initiated Backchannel...

Traditional OpenID Connect authentication flows in web and mobile applications rely on browser redirects. Users typically start the authentication...

Passkeys: an Overview

Passkeys are a new kind of login credentials that entirely replace passwords.

Online Alcohol Sales in Finland: How to Ensure Age...

In Finland, there's a proposal to enable consumers to purchase alcohol online.

One crucial requirement for allowing the delivery of alcoholic...

View all posts

Sign up for our blog

Stay up to date on industry news and insights