Okta
composer require socialiteproviders/okta
Installation & Basic Usage
Please see the Base Installation Guide, then follow the provider specific instructions below., (*1)
Add configuration to config/services.php
'okta' => [
'base_url' => env('OKTA_BASE_URL'),
'client_id' => env('OKTA_CLIENT_ID'),
'client_secret' => env('OKTA_CLIENT_SECRET'),
'redirect' => env('OKTA_REDIRECT_URI')
],
Multi Tenant SSO
If you need to authenticate users from multiple okta instances, you can dynamically set the configuration values prior to calling the redirect
/user
methods. You'll still need to add the services entry as per above, but you can leave all the values as null
., (*2)
$config = new \SocialiteProviders\Manager\Config(
'client_id',
'client_secret',
route('okta.callback'),
[
'base_url' => 'https://1234.okta.com',
]
);
\Laravel\Socialite\Facades\Socialite::driver('okta')
->setConfig($config)
->redirect();
Custom Auth Server
If you're using Okta Developer you should set auth_server_id
config option appropriately. It should be set to "default", or to the server id of your Custom Authorization Server., (*3)
For more information, see the okta docs., (*4)
Add provider event listener
Laravel 11+
In Laravel 11, the default EventServiceProvider
provider was removed. Instead, add the listener using the listen
method on the Event
facade, in your AppServiceProvider
boot
method., (*5)
- Note: You do not need to add anything for the built-in socialite providers unless you override them with your own providers.
Event::listen(function (\SocialiteProviders\Manager\SocialiteWasCalled $event) {
$event->extendSocialite('okta', \SocialiteProviders\Okta\Provider::class);
});
Laravel 10 or below
Configure the package's listener to listen for SocialiteWasCalled
events. , (*6)
Add the event to your listen[]
array in app/Providers/EventServiceProvider
. See the Base Installation Guide for detailed instructions., (*7)
protected $listen = [
\SocialiteProviders\Manager\SocialiteWasCalled::class => [
// ... other providers
\SocialiteProviders\Okta\OktaExtendSocialite::class.'@handle',
],
];
, (*8)
Usage
You should now be able to use the provider like you would regularly use Socialite (assuming you have the facade installed):, (*9)
return Socialite::driver('okta')->redirect();
Store a local copy in your callback:, (*10)
public function handleProviderCallback(\Illuminate\Http\Request $request)
{
$user = Socialite::driver('okta')->user();
$localUser = User::updateOrCreate(['email' => $user->email], [
'email' => $user->email,
'name' => $user->name,
'token' => $user->token,
'id_token' => $user->id_token,
'refresh_token' => $user->refreshToken,
]);
try {
Auth::login($localUser);
}
catch (\Throwable $e) {
return redirect('/login-okta');
}
return redirect('/home');
}
Generate the logout url from your controller:, (*11)
public function logout(\Illuminate\Http\Request $request)
{
$idToken = $request->user()->id_token;
$logoutUrl = Socialite::driver('okta')->getLogoutUrl($idToken, URL::to('/'));
Auth::logout();
return redirect($logoutUrl);
}
Refresh Token
Using a refresh token allows an active user to maintain their session:, (*12)
$localUser = Auth::user();
$response = (object) Socialite::driver('okta')
->setScopes(['offline_access'])
->getRefreshTokenResponse($localUser->refresh_token);
$localUser->token = $response->access_token;
$localUser->refresh_token = $response->refresh_token;
$localUser->save();
Auth::setUser($localUser);
NOTE: obtaining a refresh_token
requires the scope offline_access
on the initial login.
See additional documentation here., (*13)
Client Token
To obtain a client access token for authenticating to other apps without a user:, (*14)
$response = (object) Socialite::driver('okta')->getClientAccessTokenResponse();
$token = $response->access_token;
NOTE: no caching of this token is performed. It's strongly suggested caching the token locally for its ttl, (*15)
Revoke Token
Mark a token as revoked when checked against an introspection endpoint, (*16)
$repo = Socialite::driver('okta');
$repo->revokeToken($token, 'access_token');
// verify against introspection endpoint
$state = $repo->introspectToken($token, 'access_token');
if($state['active']){...};
Returned User fields
id
email
email_verified
nickname
name
first_name
last_name
profileUrl
address
phone