4. OAuth Provider Setup
Roost supports various authentication mechanisms as mentioned below
- Github
 - Microsoft
 - Okta
 
OKTA Auth Client Setup
- Sign in to your OKTA account with admin privileges (If you do not have an existing Okta account, then sign-up at Home | Okta Developer )
 - From the left navigation menu, go to Applications -> Applications.
 - Select Create App Integration → OIDC - OpenID Connect → Web Application, then click Next
 - Fill in the suitable App integration name, upload the logo.
 - Add Sign-in redirect URIs
- https://<DNS_NAME>/login
 
 - Allow Access to users thru Assignments → Controlled Access
- Select the groups of users or Allow access to everyone
 
 - Save and Make a note of the Okta Client ID and the Client Secret (It is needed later in the config below)
 - From the left navigation menu, go to Security -> API
 - Make a note of Issuer URI for default Authorisation Server
- something like https://{your_domain}.okta.com/oauth2/default
 
 
Google Auth Client Setup
- 
Integrating Google Sign-In into your web app | Google Sign-In for Websites | Google Developers
 - 
Create Credentials, Select OAuth Client and Application Type as Web Application
 - 
Add Authorised JavaScript Origin as
- 
https://<DNS_NAME
 
 - 
Add Authorised redirect URIs
- 
https://<DNS_NAME>/login
 - 
https://<DNS_NAME>/api/auth/redirect/google
 
 - 
 - 
Download the JSON
 - 
Make a note of the Google Client ID and the Client Secret (It is needed later in the config below)