4. OAuth Provider Setup
 
Roost supports various authentication mechanisms as mentioned below
- Github
- Microsoft
- Okta
OKTA Auth Client Setup
- Sign in to your OKTA account with admin privileges (If you do not have an existing Okta account, then sign-up at Home | Okta Developer )
- From the left navigation menu, go to Applications -> Applications.
- Select Create App Integration → OIDC - OpenID Connect → Web Application, then click Next
- Fill in the suitable App integration name, upload the logo.
- Add Sign-in redirect URIs
- https://<DNS_NAME>/login
 
- Allow Access to users thru Assignments → Controlled Access
- Select the groups of users or Allow access to everyone
 
- Save and Make a note of the Okta Client ID and the Client Secret (It is needed later in the config below)
- From the left navigation menu, go to Security -> API
- Make a note of Issuer URI for default Authorisation Server
- something like https://{your_domain}.okta.com/oauth2/default
 
Google Auth Client Setup
- 
Integrating Google Sign-In into your web app | Google Sign-In for Websites | Google Developers 
- 
Create Credentials, Select OAuth Client and Application Type as Web Application 
- 
Add Authorised JavaScript Origin as 
- 
https://<DNS_NAME 
 
- 
Add Authorised redirect URIs - 
https://<DNS_NAME>/login 
- 
https://<DNS_NAME>/api/auth/redirect/google 
 
- 
- 
Download the JSON 
- 
Make a note of the Google Client ID and the Client Secret (It is needed later in the config below) 
