Okta Sign-In Widget
The Okta Sign-In Widget is a Javascript widget that provides a fully featured and customizable login experience which can be used to authenticate users of web and mobile applications.
The widget is used on Okta's default signin page to start an Okta SSO session and set the Okta session cookie in the web browser. The widget can also perform a complete OIDC flow and/or integrate with external identity providers.
See the Usage Guide for more information on how to get started using the Sign-in Widget.
- Related SDKs
- Sample applications
- Usage Guide
- API Reference
- Configuration
- Events
- Building the Widget
- Browser support
- Contributing
Related SDKs
The Sign-in Widget is self-contained and requires no other frameworks at runtime. However, there may be certain features your app needs such as token storage, renewal, or validation, which the widget does not provide.
These SDKs are fully compatible with the Okta Sign-in Widget and provide utilities to help integrate Okta authentication end-to-end in your own application.
Javascript
- okta-auth-js
- okta-react
- okta-angular
- okta-vue
- oidc-middleware (Express / NodeJS)
Java
.Net
Sample applications
Complete sample applications demonstrate usage of the Okta Sign-In Widget in both Okta-hosted and embedded scenarios.
- Javascript
- React
- Angular
- Vue
- Asp.Net Core 2.x
- ASP.Net Core 3.x
- ASP.Net 4.x
- ASP.Net Webforms
- Golang
- Java/Spring Boot
- NodeJS/Express
- PHP
- Python/Flask
Usage Guide
There are several ways to use the Okta Sign-in Widget:
-
Okta provides a default signin page for your organization, hosted at your organization's Okta URL.
-
Okta supports an option to create a custom domain with a highly customizable Okta-hosted signin page.
-
You can embed the widget directly into your application.
Okta-hosted signin page (default)
Okta provides a signin page, available at your organization's URL which allows the user to complete the entire authorization flow, start a SSO (Single Sign-On) session, and set the Okta session cookie in the web browser. This page can be customized with a background image and logo. By default, signing in on this page will redirect the user to the Okta user dashboard.
The default Okta-hosted signin page can also be used to authenticate a user in an OIDC application. Your app can redirect to a sigin-in page to perform the authentication flow after which Okta will redirect back to the app callback. Okta provides SDKs in many languages to help construct the redirect URL and handle the login callback as part of the hosted flow.
Okta provides several complete sample applications which demonstrate how to use the Okta hosted flow.
Okta-hosted signin page (customizable)
Okta also provides a hosted signin page which can be customized so that it is available under a custom domain which is a subdomain of your company's top-level domain. Although the page is hosted by Okta, you are able to customize the template of this page in many powerful ways.
As far as your app is concerned, the customized widget behaves the same as the default Okta-hosted widget and you can use the same hosted flow.
Embedded (self-hosted)
For a completely seamless experience, which also allows for the highest level of customization, the Sign-In Widget can be embedded directly into your application. This allows full use of the widget's configuration and api.
Using an embedded widget, client-side web and native apps can avoid the round-trip redirect of the hosted flow. An embedded widget is able to perform the OIDC flow and return OAuth tokens directly within the application. See showSignInToGetTokens.
Server-side web applications using the authorization code flow will complete the OIDC flow and receive OAuth tokens on the server, so they must use a redirect flow. These apps should use showSignInAndRedirect.
You can embed the Sign-In Widget in your app either by including a script from the Okta CDN or by bundling the npm module @okta/okta-signin-widget with your app.
Using the Okta CDN
Loading our assets directly from the CDN is a good choice if you want an easy way to get started with the widget or don't already have an existing build process that leverages npm for external dependencies.
To embed the Sign-in Widget via CDN, include links to the JS and CSS files in your HTML:
<!-- Latest CDN production Javascript and CSS -->
<script src="https://global.oktacdn.com/okta-signin-widget/5.6.1/js/okta-sign-in.min.js" type="text/javascript"></script>
<link href="https://global.oktacdn.com/okta-signin-widget/5.6.1/css/okta-sign-in.min.css" type="text/css" rel="stylesheet"/>
The CDN URLs contain a version number. This number should be the same for both the Javascript and the CSS file and match a version on the releases page.
The standard JS asset served from our CDN includes polyfills via core-js
and regenerator-runtime
to ensure compatibility with older browsers.
<!-- Latest CDN production Javascript without polyfills -->
<script src="https://global.oktacdn.com/okta-signin-widget/5.6.1/js/okta-sign-in.no-polyfill.min.js" type="text/javascript"></script>
Using the npm module
Using our npm module is a good choice if:
- You have a build system in place where you manage dependencies with npm
- You do not want to load scripts directly from 3rd party sites
To install @okta/okta-signin-widget:
# Run this command in your project root folder
# yarn
yarn add @okta/okta-signin-widget
# npm
npm install @okta/okta-signin-widget --save
This will install the latest version of the Sign-in Widget to your project's node_modules
directory.
The widget source files and assets will be installed to node_modules/@okta/okta-signin-widget/dist
, and will have this directory structure:
node_modules/@okta/okta-signin-widget/dist/
├── css/
│ │ # Main CSS file for widget styles. Try not to override the classes in this
│ │ # file when creating a custom theme - the classes/elements are subject to
│ │ # change between releases
│ └── okta-sign-in.min.css
│
│ # Base font and image files that are used in rendering the widget
├── font/
│
├── img/
│
├── js/
│ │ # CDN JS file that exports the OktaSignIn object in UMD format. This is
│ │ # packaged with everything needed to run the widget, including 3rd party
│ │ # vendor files and polyfills.
│ ├── okta-sign-in.min.js
| |
│ │ # CDN JS file bundled without polyfills.
│ ├── okta-sign-in.no-polyfill.min.js
│ │
│ │ # Main entry file that is used in the npm require(@okta/okta-signin-widget)
│ │ # flow. This does not package 3rd party dependencies - these are pulled
│ │ # down through `npm install` (which allows you to use your own version of
│ │ # jquery, etc).
│ ├── okta-sign-in.entry.js
│ │
│ │ # Development version of okta-sign-in.min.js. Equipped with helpful
│ │ # console warning messages for common configuration errors.
│ └── okta-sign-in.js
│
│ # Localized strings that are used to display all text and labels in the
│ # widget. Three output formats are included - json and properties
├── labels/
│
│ # Sass files that are used to generate the widget css. If you are already
│ # using Sass in your project, you can include these helper files to make
│ # generating your custom theme easier
└── sass/
After installing:
-
Copy the assets to a folder that will be distributed to your publicly hosted site. The folders you'll need to copy are
css
,font
,img
,js
andlabels
. -
Instead of copying the
js
directory and including it in your page as a global, you can require the Sign-In Widget in your build if you are using Webpack, Browserify, or another module bundling system that understands thenode_modules
format.// Load the Sign-In Widget module var OktaSignIn = require('@okta/okta-signin-widget'); // Use OktaSignIn var signIn = new OktaSignIn(/* configOptions */);
Source maps are provided as an external .map file. If you are using Webpack, these can be loaded using the source-map-loader plugin.
Note: If you use Browserify to bundle your app, you'll need to use the
--noparse
option:browserify main.js \ --noparse=$PWD/node_modules/@okta/okta-signin-widget/dist/js-okta-sign-in.entry.js \ --outfile=bundle.js
-
Make sure you include ES6 polyfills with your bundler if you need the broadest browser support.
Examples
SPA Application
Although a redirectUri
is required in the configuration, no redirection will occur using this flow. The Sign-in Widget will communicate with Okta and receive tokens directly.
var signIn = new OktaSignIn(
{
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}'
}
);
signIn.showSignInToGetTokens({
// Assumes there is an empty element on the page with an id of 'osw-container'
el: '#osw-container'
}).then(function(tokens) {
// Store tokens
}).catch(function(error) {
// Handle error
});
PKCE is enabled by default for new SPA applications. (SPA applications can enable or disable PKCE
in the Okta Admin UI under the General Settings
for the application.) Although PKCE is recommended for SPA applications, the implicit flow is supported. To use implicit flow in a SPA Application, set authParams.pkce
to false
, as shown:
var signIn = new OktaSignIn(
{
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}',
authParams: {
pkce: false,
}
}
);
Web Application
This example uses the authorization code flow
var signIn = new OktaSignIn(
{
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}',
authParams: {
pkce: false,
responseType: 'code'
}
}
);
// When the authorization flow is complete there will be a redirect to Okta.
// Okta's servers will process the information and then redirect back to your application's `redirectUri`
// If succesful, an authorization code will exist in the URL as the "code" query parameter
// If unsuccesful, there will be an "error" query parameter in the URL
signIn.showSignInAndRedirect({
// Assumes there is an empty element on the page with an id of 'osw-container'
el: '#osw-container'
}).catch(function(error) {
// Handle error
});
non-OIDC Applications
In most cases, the widget will be used to authenticate users into an OIDC application. However, the Sign-in widget can also be used to authenticate a user outside of an OIDC application.
To disable OIDC, do not set an OIDC configuration. The renderEl method can be used to perform the authentication flow.
Note: API methods used to obtain tokens, such as showSignInToGetTokens or showSignInAndRedirect require an OIDC configuration
var signIn = new OktaSignIn({
baseUrl: 'https://{yourOktaDomain}',
})
signIn.renderEl({
// Assumes there is an empty element on the page with an id of 'osw-container'
el: '#osw-container'
}).then(function(res) {
if (res.status === 'SUCCESS') {
// user is authenticated
console.log('user is authenticated', res.user);
}
})
API Reference
Interaction Code Flow
Support for the interaction code grant is available for organizations with the Identity Engine feature enabled. Please visit Migrating to OIE for more details.
Documentation for configuring the Okta Sign-in Widget for the interaction code grant is available here.
OktaSignIn
Creates a new instance of the Sign-In Widget with the provided options. The widget has many config options. The only required option to get started is baseUrl
, the base url for your Okta domain.
config
- Options that are used to configure the widget
var signIn = new OktaSignIn(
{
baseUrl: 'https://{yourOktaDomain}'
}
);
Note:
https://{yourOktaDomain}
can be any Okta organization. See Basic config options for more information.
For OIDC applications, including Social Login, you will want to provide the OIDC configuration:
var signIn = new OktaSignIn(
{
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}'
}
);
showSignInToGetTokens
Returns a Promise. Renders the widget to the DOM to prompt the user to sign in. On successful authentication, the Promise will be resolved to an object containing OAuth tokens.
options
el
*(optional) - CSS selector which identifies the container element that the widget attaches to. If omitted, defaults to the value passed in during the construction of the Widget.clientId
(optional) - Client Id pre-registered with Okta for the OIDC authentication flow. If omitted, defaults to the value passed in during the construction of the Widget.redirectUri
(optional) - The url that is redirected to after authentication. This must be pre-registered as part of client registration. Defaults to the current origin.scopes
(optional) - Specify what information to make available in the returned access or ID token. If omitted, defaults to the value ofauthParams.scopes
passed in during construction of the Widget. Defaults to['openid', 'email']
var signIn = new OktaSignIn({
// Assumes there is an empty element on the page with an id of 'osw-container'
el: '#osw-container',
clientId: '{{myClientId}}',
redirectUri: '{{redirectUri configured in OIDC app}}',
baseUrl: 'https://{yourOktaDomain}'
});
signIn.showSignInToGetTokens({
scopes: ['openid', 'profile'] // optional
}).then(function(tokens) {
// Store tokens
}).catch(function(error) {
// This function is invoked with errors the widget cannot recover from:
// Known errors: CONFIG_ERROR, UNSUPPORTED_BROWSER_ERROR
});
showSignInAndRedirect
Returns a Promise. Renders the widget to the DOM to prompt the user to sign in. On successful authentication, the browser will be redirected to Okta with information to begin a new session. Okta's servers will process the information and then redirect back to your application's redirectUri
. If succesful, an authorization code will exist in the URL as the "code" query parameter. If unsuccesful, there will be an "error" query parameter in the URL.
options
el
*(optional) - CSS selector which identifies the container element that the widget attaches to. If omitted, defaults to the value passed in during the construction of the Widget.clientId
(optional) - Client Id pre-registered with Okta for the OIDC authentication flow. If omitted, defaults to the value passed in during the construction of the Widget.redirectUri
(optional) - The url that is redirected to after authentication. This must be pre-registered as part of client registration. Defaults to the current origin.
var signIn = new OktaSignIn({
// Assumes there is an empty element on the page with an id of 'osw-container'
el: '#osw-container'
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}',
authParams: {
pkce: false,
responseType: 'code'
}
});
signIn.showSignInAndRedirect().catch(function(error) {
// This function is invoked with errors the widget cannot recover from:
// Known errors: CONFIG_ERROR, UNSUPPORTED_BROWSER_ERROR
});
renderEl
Returns a Promise. Renders the widget to the DOM. On success, the promise will resolve. On error, the promise will reject. Also accepts a success
or error
callback function.
⚠️ This method provides access to internal and/or undocumented features for non-OIDC flows. For OIDC flows, we recommend using showSignInToGetTokens or showSignAndRedirect.
options
el
(optional) - CSS selector which identifies the container element that the widget attaches to. If omitted, defaults to the value passed in during the construction of the Widget.
success
(optional) - Function that is called when the user has completed an authentication flow. If an OpenID Connect redirect flow is used, this function can be omitted. See below for more details.error
(optional) - Function that is called when the widget has been initialized with invalid config options, or has entered a state it cannot recover from. If omitted, a default function is used to output errors to the console.
success
Function that handles non-error events, including the completion of a successful authentication flow by a user. Also handles other flows such as reset password and self-registration flows.
OIDC vs Non-OIDC Configurations:
New integrations are recommended to use OIDC as it uses a more lightweight REST-based protocol and has more widespread usage. Less common is the need for non-OIDC integrations in self-hosted applications, however one example of this usage is when using the Okta-hosted sign-in widget to redirect a user to the Okta Dashboard after authentication.
res
parameter:
This success
function will be called with an object, that can have various properties, depending on how the widget is configured:
success({
status: String,
username: optional<string>,
activationToken: optional<object>,
tokens: optional<object>,
type: optional<string>,
user: optional<object>,
stepUp: optional<function>,
session: optional<object>,
next: optional<function>,
})
-
status
(string) - Always present. One of:FORGOT_PASSWORD_EMAIL_SENT
,UNLOCK_ACCOUNT_EMAIL_SENT
,ACTIVATION_EMAIL_SENT
,REGISTRATION_COMPLETE
, orSUCCESS
-
username
(optional<string>) - Only present whenstatus
is one ofFORGOT_PASSWORD_EMAIL_SENT
,UNLOCK_ACCOUNT_EMAIL_SENT
,ACTIVATION_EMAIL_SENT
, orREGISTRATION_COMPLETE
. -
activationToken
(optional<object>) - Only present whenstatus
isREGISTRATION_COMPLETE
. -
tokens
(optional<object>) - Only present when widget is in an OIDC configuration, andstatus
isSUCCESS
. Depending on the widgetresponseType
configuration, this will contain anaccessToken
only or bothaccessToken
andidToken
. -
type
(optional<string>) - Only present when widget is in a non-OIDC configuration andstatus
isSUCCESS
. One ofSESSION_STEP_UP
, orSESSION_SSO
. -
user
(optional<object>) - Only present when widget is in a non-OIDC configuration,status
isSUCCESS
, andtype
isSESSION_STEP_UP
. -
stepUp
(optional<function>) - Only present when widget is in a non-OIDC configuration,status
isSUCCESS
, andtype
isSESSION_STEP_UP
.res.stepUp.finish()
call redirect the user to the URL atres.stepUp.url
. -
next
(optional<function>) - May be present when widget is in a non-OIDC configuration,status
isSUCCESS
, and the response contains a redirect URL. Calling this function will redirect the user. -
session
(optional<object>) - Only present when widget is in a non-OIDC configuration,status
isSUCCESS
, andtype
isSESSION_SSO
.res.session.setCookieAndRedirect(url)
will redirect the user to the passed URL.
hide
Hide the widget, but keep the widget in the DOM.
signIn.hide();
show
Show the widget if hidden.
signIn.show();
remove
Remove the widget from the DOM entirely.
signIn.remove();
on
Subscribe to an event published by the widget.
event
- Event to subscribe tocallback
- Function to call when the event is triggered
// Handle a 'ready' event using an onReady callback
signIn.on('ready', onReady);
off
Unsubscribe from widget events. If no callback is provided, unsubscribes all listeners from the event.
event
- Optional event to unsubscribe fromcallback
- Optional callback that was used to subscribe to the event
// Unsubscribe all listeners from all events
signIn.off();
// Unsubscribe all listeners that have been registered to the 'ready' event
signIn.off('ready');
// Unsubscribe the onReady listener from the 'ready' event
signIn.off('ready', onReady);
authClient
Returns the underlying @okta/okta-auth-js
object used by the Sign-in Widget. All methods are documented in the AuthJS base library.
// Check for an existing authClient transaction
signIn.authClient.session.exists()
.then(function(exists) {
if (exists){
console.log('A session exists!');
} else {
console.log('A session does not exist.');
};
});
The authClient
can be set directly in the configuration:
var authClient = new OktaAuth({
issuer: 'https://{yourOktaDomain}/oauth2/default',
clientId: '{yourClientId}'
});
var config = {
baseUrl: 'https://{yourOktaDomain}',
authClient: authClient
};
var signIn = new OktaSignIn(config);
// signIn.authClient === authClient
If no authClient
option is set, an instance will be created using authParams
:
var config = {
baseUrl: 'https://{yourOktaDomain}',
authParams: {
issuer: 'https://{yourOktaDomain}/oauth2/default',
clientId: '{yourClientId}'
}
};
var signIn = new OktaSignIn(config);
// signIn.authClient.options.clientId === '{yourClientId}'
Configuration
The only required configuration option is baseUrl
. All others are optional.
// Basic example
var config = {
baseUrl: 'https://{yourOktaDomain}',
logo: '/path/to/logo.png',
logoText: 'logo text',
helpSupportNumber: '(123) 456-7890',
language: 'en',
i18n: {
en: {
'primaryauth.title': 'Sign in to Acme'
}
},
helpLinks: {
help: 'https://acme.com/help'
},
authParams: {
// Configuration for the internal authClient. See https://github.com/okta/okta-auth-js#configuration-options
}
};
var signIn = new OktaSignIn(config);
OIDC Applications
For OIDC applications, you need to set the clientId
and redirectUri
(in addition to baseUrl
).
var config = {
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}'
}
By default, the issuer (Authorization Server) will be set to the default Custom Authorization Server:
// default issuer
config.baseUrl + '/oauth2/default'
A different Custom Authorization Server can be specified by setting the issuer
in the authParams
section:
var config = {
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}',
authParams: {
issuer: 'https://{yourOktaDomain}/oauth2/{authServerID}'
}
}
Some applications, such as those that require access to the Okta User API, will want to use the Okta Organization Authorization Server as the issuer. In this case the issuer
should match the baseUrl
:
var config = {
baseUrl: 'https://{yourOktaDomain}',
clientId: '{{clientId of your OIDC app}}'
redirectUri: '{{redirectUri configured in OIDC app}}',
authParams: {
issuer: 'https://{yourOktaDomain}'
}
}
Basic config options
-
baseUrl: The base URL for your Okta organization
// Production org with subdomain "acme" baseUrl: 'https://acme.okta.com' // Can also target oktapreview and okta-emea, i.e. baseUrl: 'https://acme.oktapreview.com'
-
logo: Local path or URL to a logo image that is displayed at the top of the Sign-In Widget
// Hosted on the same origin logo: '/img/logo.png' // Can also be a full url logo: 'https://acme.com/img/logo.png'
-
logoText: Text for
alt
attribute of the logo image, logo text will only show up when logo image is not avaiable// Text to describe the logo logoText: 'logo text'
-
helpSupportNumber: Support phone number that is displayed in the Password Reset and Unlock Account flows. If no number is provided, no support screen is shown to the user.
// Can be any format - there are no formatting checks helpSupportNumber: '(123) 456-7890'
-
brandName: The brand or company name that is displayed in messages rendered by the Sign-in Widget (for example, "Reset your {
brandName
} password"). If nobrandName
is provided, a generic message is rendered instead (for example, "Reset your password"). You can further customize the text that is displayed with language and text settings.brandName: 'Spaghetti Inc.'
Username and password
-
username: Prefills the username input with the provided username
username: '[email protected]'
-
transformUsername: Transforms the username before sending requests with the username to Okta. This is useful when you have an internal mapping between what the user enters and their Okta username.
// The callback function is passed two arguments: // 1) username: The name entered by the user // 2) operation: The type of operation the user is trying to perform: // - PRIMARY_AUTH // - FORGOT_PASSWORD // - UNLOCK_ACCOUNT transformUsername: function (username, operation) { // This example will append the '@acme.com' domain if the user has // not entered it return username.indexOf('@acme.com') > -1 ? username : username + '@acme.com'; }
-
processCreds: Hook to handle the credentials before they are sent to Okta in the Primary Auth, Password Expiration, and Password Reset flows.
If processCreds takes a single argument it will be executed as a synchronous hook:
// Passed a creds object {username, password} processCreds: function (creds) { // This example demonstrates a partial integration with ChromeOS google.principal.add({ token: creds.username, user: creds.username, passwordBytes: creds.password, keyType: 'KEY_TYPE_PASSWORD_PLAIN' }); }
If processCreds takes two arguments it will be executed as an asynchronous hook:
// Passed a creds object {username, password} and a callback for further processing processCreds: function (creds, callback) { // This example demonstrates optional legacy form-based login $.ajax({ method: "POST", url: "/logintype", data: { username : creds.username }, success: function (logintype) { if (logintype == "LEGACY") { $('#legacyUser').val(creds.username); $('#legacyPassword').val(creds.password); $('#legacyLogonForm').submit(); } else { callback(); } } }); }
Language and text
-
language: Set the language of the widget. If no language is specified, the widget will choose a language based on the user's browser preferences if it is supported, or defaults to
en
.// You can simply pass the languageCode as a string: language: 'ja' // Or, if you need to determine it dynamically, you can pass a // callback function: language: function (supportedLanguages, userLanguages) { // supportedLanguages is an array of languageCodes, i.e.: // ['cs', 'da', ...] // // userLanguages is an array of languageCodes that come from the user's // browser preferences return supportedLanguages[0]; }
Supported languages:
cs
- Czechda
- Danishde
- Germanel
- Greeken
- Englishes
- Spanishfi
- Finnishfr
- Frenchhu
- Hungarianid
- Indonesianit
- Italianja
- Japaneseko
- Koreanms
- Malaysiannb
- Norwegiannl-NL
- Dutchpl
- Polishpt-BR
- Portuguese (Brazil)ro
- Romanianru
- Russiansv
- Swedishth
- Thaitr
- Turkishuk
- Ukrainianzh-CN
- Chinese (PRC)zh-TW
- Chinese (Taiwan)
-
defaultCountryCode: Set the default countryCode of the widget. If no
defaultCountryCode
is provided, defaults toUS
. It sets the country calling code for phone number accordingly in the widget. -
i18n: Override the text in the widget. The full list of properties can be found in the login.properties and country.properties files.
// The i18n object maps language codes to a hash of property keys -> // property values. i18n: { // Overriding English properties 'en': { 'primaryauth.title': 'Sign in to Acme', 'primaryauth.username.placeholder': 'Your Acme Username' }, // Overriding Japanese properties 'ja': { 'primaryauth.title': 'ACMEにサインイン', 'primaryauth.username.placeholder': 'ACMEのユーザー名' } } // If you want to override any properties in the country.properties file, // you will need to prefix the name with "country.": i18n: { 'en': { // login.properties keys do not have a special prefix 'primaryAuth.title': 'Sign in to Acme', // country.properties keys are prefixed with 'country.' 'country.AF': 'Afghanistan, edited', 'country.AL': 'Albania, edited' } }
-
assets.baseUrl: Override the base url the widget pulls its language files from. The widget is only packaged with english text by default, and loads other languages on demand from the Okta CDN. If you want to serve the language files from your own servers, update this setting.
// Loading the assets from a path on the current domain assets: { baseUrl: '/path/to/dist' }, // Full urls work as well assets: { baseUrl: 'https://acme.com/assets/dist' }
Note: The json files can be accessed from the
dist/labels/json
folder that is published in the npm module. -
assets.rewrite: You can use this function to rewrite the asset path and filename. Use this function if you will host the asset files on your own host, and plan to change the path or filename of the assets. This is useful, for example, if you want to cachebust the files.
assets: { // Note: baseUrl is still needed to set the base path baseUrl: '/path/to/dist', rewrite: function (assetPath) { // assetPath is relative to baseUrl // Example assetPath to load login for 'ja': "/labels/json/login_ja.json" return someCacheBustFunction(assetPath); } }
Colors
These options let you customize the appearance of the Sign-in Widget.
If you want even more customization, you can modify the Sass source files and build the Widget.
-
colors.brand: Sets the brand (primary) color. Colors must be in hex format, like
#008000
.colors: { brand: '#008000' }
Links
You can override a link URL by setting the following config options. If you'd like to change the link text, use the i18n
config option.
Help Links
Set the following config options to override the help link URLs on the Primary Auth page.
// An example that overrides all help links, and sets two custom links
helpLinks: {
help: 'https://acme.com/help',
forgotPassword: 'https://acme.com/forgot-password',
factorPage: {
text: 'Need help with MFA?',
href: 'https://acme.com/mfa-help',
},
unlock: 'https://acme.com/unlock-account',
custom: [
{
text: 'What is Okta?',
href: 'https://acme.com/what-is-okta'
},
{
text: 'Acme Portal',
href: 'https://acme.com',
target: '_blank'
}
]
}
-
helpLinks.help - Custom link href for the "Help" link
-
helpLinks.forgotPassword - Custom link href for the "Forgot Password" link
-
helpLinks.unlock - Custom link href for the "Unlock Account" link. For this link to display,
features.selfServiceUnlock
must be set totrue
, and the self service unlock feature must be enabled in your admin settings. -
helpLinks.factorPage - Custom link object
{text, href}
that will be added to all MFA pages. -
helpLinks.custom - Array of custom link objects
{text, href, target}
that will be added to the "Need help signing in?" section. Thetarget
of the link is optional.
Sign Out Link
Set the following config option to override the sign out link URL. If not provided, the widget will navigate to Primary Auth.
signOutLink: 'https://www.signmeout.com'
Buttons
You can add buttons to the Primary Auth page by setting the following config options.
Custom Buttons
You can add custom buttons underneath the login form on the primary auth page by setting the following config options. If you'd like to change the divider text, use the i18n
config option.
// An example that adds a custom button underneath the login form on the primary auth page
customButtons: [{
title: 'Click Me',
className: 'btn-customAuth',
click: function() {
// clicking on the button navigates to another page
window.location.href = 'https://www.example.com';
}
}]
// An example that adds a custom button with a localized title underneath the login form on the primary auth page
i18n: {
en: {
'customButton.title': 'Custom Button Title',
},
},
customButtons: [{
i18nKey: 'customButton.title',
className: 'btn-customAuth',
click: function() {
// clicking on the button navigates to another page
window.location.href = 'https://www.example.com';
}
}]
-
customButtons.title - String that is set as the button text (set only one of
title
ORi18nKey
) -
customButtons.i18nKey - Custom translation key for button text specified in
i18n
config option (set only one oftitle
ORi18nKey
) -
customButtons.className - Optional class that can be added to the button
-
customButtons.click - Function that is called when the button is clicked
Registration Button
You can add a registration link to the primary auth page by setting features.registration
to true
and by adding the following config options.
// An example that adds a registration button underneath the login form on the primary auth page
registration: {
click: function() {
window.location.href = 'https://acme.com/sign-up';
}
}
- registration.click - Function that is called when the registration button is clicked
Registration
To add registration into your application, configure your Okta admin settings to allow users to self register into your app. Then, set features.registration
in the widget. You can add additional configs under the registration key on the OktaSignIn
object.
var signIn = new OktaSignIn({
baseUrl: 'https://{yourOktaDomain}',
// If you are using version 2.8 or higher of the widget, clientId is not required while configuring
// registration. Instead the widget relies on policy setup with Self Service Registration. For help
// with setting up Self Service Registration contact support@okta.com. Registration should continue
// to work with a clientId set and version 2.7 or lower of the widget.
clientId: '{{myClientId}}', // REQUIRED (with version 2.7.0 or lower)
registration: {
parseSchema: function(schema, onSuccess, onFailure) {
// handle parseSchema callback
onSuccess(schema);
},
preSubmit: function (postData, onSuccess, onFailure) {
// handle preSubmit callback
onSuccess(postData);
},
postSubmit: function (response, onSuccess, onFailure) {
// handle postsubmit callback
onSuccess(response);
}
},
features: {
// Used to enable registration feature on the widget.
// https://github.com/okta/okta-signin-widget#feature-flags
registration: true // REQUIRED
}
});
Optional configuration:
-
parseSchema: Callback used to mold the JSON schema that comes back from the Okta API.
// The callback function is passed 3 arguments: schema, onSuccess, onFailure // 1) schema: json schema returned from the API. // 2) onSuccess: success callback. // 3) onFailure: failure callback. Note: accepts an errorObject that can be used to show form level or field level errors. parseSchema: function (schema, onSuccess, onFailure) { // This example will add an additional field to the registration form schema.profileSchema.properties.address = { 'type': 'string', 'description': 'Street Address', 'default': 'Enter your street address', 'maxLength': 255 }; schema.profileSchema.fieldOrder.push('address'); onSuccess(schema); }
-
preSubmit: Callback used primarily to modify the request parameters sent to the Okta API.
// The callback function is passed 3 arguments: postData, onSuccess, onFailure // 1) postData: form data that will be posted to the registration API. // 2) onSuccess: success callback. // 3) onFailure: failure callback. Note: accepts a errorObject that can be used to show form level or field level errors. preSubmit: function (postData, onSuccess, onFailure) { // This example will add @companyname.com to the email if user fails to add it during registration if (postData.username.indexOf('@acme.com') > 1) { return postData.username; } else { return postData.username + '@acme.com'; } }
-
postSubmit: Callback used to primarily get control and to modify the behavior post submission to registration API .
// The callback function is passed 3 arguments: response, onSuccess, onFailure // 1) response: response returned from the API post registration. // 2) onSuccess: success callback. // 3) onFailure: failure callback. Note: accepts an errorObject that can be used to show form level // or field level errors. postSubmit: function (response, onSuccess, onFailure) { // In this example postSubmit callback is used to log the server response to the browser console before completing registration flow console.log(response); // call onSuccess to finish registration flow onSuccess(response); }
-
onFailure and ErrorObject: The onFailure callback accepts an error object that can be used to show a form level vs field level error on the registration form.
Use the default error
preSubmit: function (postData, onSuccess, onFailure) { // A Default form level error is shown if no error object is provided onFailure(); }
Use form level error
preSubmit: function (postData, onSuccess, onFailure) { var error = { "errorSummary": "Custom form level error" }; onFailure(error); }
Use field level error
preSubmit: function (postData, onSuccess, onFailure) { var error = { "errorSummary": "API Error", "errorCauses": [ { "errorSummary": "Custom field level error", "reason": "registration.error.address", "resource": "User", "property": "address", //should match field name "arguments": [] } ] }; onFailure(error); }
IdP Discovery
IdP Discovery enables you to route users to different 3rd Party IdPs that are connected to your Okta Org. Users can federate back into the primary org after authenticating at the IdP.
To use IdP Discovery in your application, configure an identity provider routing rule in the Okta admin panel. Then, in the widget configuration, set features.idpDiscovery
to true
.
var signIn = new OktaSignIn({
baseUrl: 'https://{yourOktaDomain}',
... ...
features: {
idpDiscovery: true
}
});
Note: IdP Discovery is supported for Okta-hosted Widget setup only. IdP Discovery for self-hosted Widget is not officialy supported by v1 API and requires an extra step to complete OIDC flow. This step involves calling session.exists
and token.getWithoutPrompt
methods which rely on third party cookies to be available. The below snippet applies to a SPA app hosting Sign-In Widget:
var signIn = new OktaSignIn({
baseUrl: 'https://{yourOktaDomain}',
clientId: '{appClientId}',
... ...
features: {
idpDiscovery: true
},
idpDiscovery: {
requestContext: window.location.href
}
});
... ...
// after successfull authentication with IdP
signIn.authClient.session.exists().then(function (sessionExists) {
if (sessionExists) {
signIn.authClient.token.getWithoutPrompt().then(function (tokens) {
signIn.authClient.tokenManager.setTokens(tokens);
});
}
The IdP Discovery authentication flow in widget will be
- If a routing policy with a username/domain condition is configured, the widget will enter identifier first flow
- Otherwise, the widget will enter primary authentication flow.
For the identifier first flow,
- The widget will display an identifier first page for the user to enter an Okta userName to determine the IdP to be used for authentication.
- If the IdP is your Okta org, the widget will transition to the primary authentication flow.
- If the IdP is a 3rd party IdP or a different Okta org, the widget will automatically redirect to path of the 3rd party IdP.
Additional configuration
OpenID Connect
Options for the OAuth Open ID Connect (OIDC) authentication flow.
OIDC flow is required for Social Login.
| Note: Configuration values can be found in the Okta Admin UI under the application's "General Settings"
-
clientId: Client Id of the application. Required for OIDC flow. If this option is not set, all other options in this section are ignored.
clientId: 'GHtf9iJdr60A9IYrR0jw'
-
redirectUri: For redirect flows, this URI will be used as the callback url. If no
redirectUri
is provided, defaults to the current origin. (In this example,https://acme.com
)redirectUri: 'https://acme.com/oauth2/callback/home'
| Note: The value for redirectUri
(or current origin) must be listed in the set of "Login Redirect URIs" shown on the application's "General Settings" in the Okta Admin UI
-
idps: External Identity Providers to use in OIDC authentication, also known as Social Login. Supported IDPs (
GOOGLE
,FACEBOOK
,APPLE
,MICROSOFT
andLINKEDIN
) are declared with atype
and will get distinct styling and default i18n text, while any other entry will receive a general styling and require text to be provided. Each IDP can have additional CSS classes added via an optionalclassName
property.idps: [ {type: 'GOOGLE', id: '0oaaix1twko0jyKik0g1'}, {type: 'FACEBOOK', id: '0oar25ZnMM5LrpY1O0g2'}, {type: 'APPLE', id: '0oaaix1twko0jyKik0g3'}, {type: 'MICROSOFT', id: '0oaaix1twko0jyKik0g4'}, {type: 'LINKEDIN', id: '0oaaix1twko0jyKik0g5'}, {id: '0oabds23xM3ssMjosl0g5', text: 'Login with Joe', className: 'with-joe' } ]
-
idpDisplay: Display order for external identity providers relative to the Okta login form. Defaults to
SECONDARY
.PRIMARY
- Display External IDP buttons above the Okta login formSECONDARY
- Display External IDP buttons below the Okta login form
idpDisplay: 'PRIMARY'
-
oAuthTimeout: Timeout for OIDC authentication flow requests, in milliseconds. If the authentication flow takes longer than this timeout value, an error will be thrown and the flow will be cancelled. Defaults to
12000
.oAuthTimeout: 300000 // 5 minutes
-
authClient: An AuthJS instance. This will be available on the widget instance as the authClient property. Note: If the
authClient
option is used,authParams
will be ignored. -
authParams: An object containing configuration which is used to create the internal authClient`. Selected options are described below. See the full set of Configuration options
-
authParams.pkce: Set to
false
to disable PKCE flow -
authParams.display: Specify how to display the authentication UI for external identity providers. Defaults to
popup
.-
popup
- Opens a popup to the authorization server when an External Identity Provider button is clicked.responseMode
will be set tookta_post_message
and cannot be overridden. -
page
- Redirect to the authorization server when an External Identity Provider button is clicked.
// Redirects to authorization server when the IDP button is clicked, and // returns an access_token in the url hash (Implicit flow) authParams: { display: 'page', responseType: 'token', pkce: false } // With PKCE flow, you should leave responseType blank. // An authorization code will be returned in the query which can be exchanged for tokens. authParams: { display: 'page' }
-
-
authParams.responseMode: Specify how the [authorization][] response should be returned. You will generally not need to set this unless you want to override the default values for your
authParams.display
andauthParams.responseType
settings.-
okta_post_message
- Used whenauthParams.display = 'popup'
. Uses postMessage to send the response from the popup to the origin window. -
fragment
- Used whenauthParams.display = 'page'
. Returns the authorization response in the hash fragment of the URL after the authorization redirect.fragment
is the default for Single-page applications using the implicit OIDC flow and for standard web applications whereresponseType != 'code'
. SPA Applications using PKCE flow can setresponseMode = 'fragment'
to receive the authorization code in the hash fragment instead of the query. -
query
- Used whenauthParams.display = 'page'
. Returns the authorization response in the query string of the URL after the authorization redirect.query
is the default value for standard web applications whereauthParams.responseType = 'code'
. For SPA applications, the default will bequery
if using PKCE, orfragment
for implicit OIDC flow. -
form_post
- Returns the authorization response as a form POST after the authorization redirect. Use this whenauthParams.display = page
and you do not want the response returned in the URL.
// Use form_post instead of query in the Authorization Code flow authParams: { display: 'page', responseType: 'code', responseMode: 'form_post' }
-
-
authParams.responseType: Specify the response type for OIDC authentication. Defaults to
['id_token', 'token']
.Valid response types are
id_token
,access_token
, andcode
. Note thatcode
goes through the Authorization Code flow, which requires the server to exchange the Authorization Code for tokens.// Specifying a single responseType authParams: { responseType: 'token' } // Use an array if specifying multiple response types - in this case, // the response will contain both an ID Token and an Access Token. authParams: { responseType: ['id_token', 'token'] }
-
authParams.scopes: Specify what information to make available in the returned
id_token
oraccess_token
. For OIDC, you must includeopenid
as one of the scopes. Defaults to['openid', 'email']
.Valid OIDC scopes:
openid
,email
,profile
,address
,phone
authParams: { scopes: ['openid', 'email', 'profile', 'address', 'phone'] }
-
authParams.state: Specify a state that will be validated in an OAuth response. This is usually only provided during redirect flows to obtain an authorization code. Defaults to a random string. This value can be retrieved from the URL on the login redirect callback. For more information on handling the redirect callback, see authClient.token.parseFromUrl()
authParams: { state: '8rFzn3MH5q' }
-
authParams.nonce: Specify a nonce that will be validated in an id_token. This is usually only provided during redirect flows to obtain an authorization code that will be exchanged for an id_token. Defaults to a random string.
authParams: { nonce: '51GePTswrm' }
-
authParams.issuer: Specify a custom issuer to perform the OIDC flow. Defaults to the baseUrl plus "/oauth2/default". See the guide on setting up a Custom Authorization Server for more information.
authParams: { issuer: 'https://{yourOktaDomain}/oauth2/default' }
-
authParams.authorizeUrl: Specify a custom authorizeUrl to perform the OIDC flow. Defaults to the issuer plus "/v1/authorize".
authParams: { issuer: 'https://{yourOktaDomain}/oauth2/default', authorizeUrl: 'https://{yourOktaDomain}/oauth2/default/v1/authorize' }
-
authScheme: Authentication scheme for OIDC authentication. You will normally not need to override this value. Defaults to
OAUTH2
.authParams: { authScheme: 'OAUTH2' }
Smart Card IdP
Settings for authentication with a Smart Card X509
type IdP.
-
certAuthUrl
(required) - Theurl
property of the MTLS SSO Endpoint Object. The browser prompts the user to select a client certificate when this url is accessed. -
text
(optional) - Label for the Smart Card IdP button. By default, this value will be "Sign in with PIV / CAC card". -
className
(optional) - Class that can be added to the Smart Card IdP button. -
isCustomDomain
(optional) - Boolean that indicates if the request is coming from a custom domain. If omitted, it will indicate that the request is not coming from a custom domain.piv: { certAuthUrl: '/your/cert/validation/endpoint', text: 'Authenticate with a Smart Card', className: 'custom-style', isCustomDomain: true, }
Bootstrapping from a recovery token
-
recoveryToken: Bootstrap the widget into continuing either the Forgot Password or Unlock Account flow after the recovery email has been sent to the user with the
recoveryToken
.recoveryToken: 'x0whAcR02i0leKtWMZVc'
Feature flags
Enable or disable widget functionality with the following options. Some of these features require additional configuration in your Okta admin settings.
// An example that enables the autoPush and multiOptionalFactorEnroll features
features: {
autoPush: true,
multiOptionalFactorEnroll: true
}
-
features.router - Set to
true
if you want the widget to update the navigation bar when it transitions between pages. This is useful if you want the user to maintain their current state when refreshing the page, but requires that your server can handle the widget url paths. Defaults tofalse
. -
features.rememberMe - Display a checkbox to enable "Remember me" functionality at login. Defaults to
true
. -
features.autoPush - Display a checkbox to enable "Send push automatically" functionality in the MFA challenge flow. Defaults to
false
. -
features.smsRecovery - Allow users with a configured mobile phone number to recover their password using an SMS message. Defaults to
false
. -
features.callRecovery - Allow users with a configured mobile phone number to recover their password using a voice call. Defaults to
false
. -
features.webauthn - Display and use factors supported by the FIDO 2.0 (Web Authentication) security standard. Enabling this feature will prevent the widget from invoking the legacy Windows Hello factor. Defaults to
false
. -
features.selfServiceUnlock - Display the "Unlock Account" link to allow users to unlock their accounts. Defaults to
false
. -
features.multiOptionalFactorEnroll - Allow users to enroll in multiple optional factors before finishing the authentication flow. Default behavior is to force enrollment of all required factors and skip optional factors. Defaults to
false
. -
features.hideSignOutLinkInMFA - Hides the sign out link for MFA challenge. Defaults to
false
. -
features.registration - Display the registration section in the primary auth page. Defaults to
false
. -
features.idpDiscovery - Enable IdP Discovery. Defaults to
false
. -
features.showPasswordToggleOnSignInPage - End users can now toggle visibility of their password on the Okta Sign-In page, allowing end users to check their password before they click Sign In. This helps prevent account lock outs caused by end users exceeding your org's permitted number of failed sign-in attempts. Note that passwords are visible for 30 seconds and then hidden automatically. Defaults to
false
.
Events
Events published by the widget. Subscribe to these events using on.
ready
Triggered when the widget is ready to accept user input for the first time. Returns a context
object containing the following properties:
- controller - Current controller name
signIn.on('ready', function (context) {
// The Widget is ready for user input
});
afterError
The widget will handle most types of errors - for example, if the user enters an invalid password or there are issues authenticating. To capture an authentication state change error after it is handled and rendered by the Widget, listen to the afterError
event. You can also capture OAuth and registration errors. For other error types, it is encouraged to handle them using the renderEl
error handler.
Returns context
and error
objects containing the following properties:
context
:- controller - Current controller name
error
:- name - Name of the error triggered
- message - Error message
- statusCode - HTTP status code (if available)
- xhr - HTTP response (if available)
signIn.on('afterError', function (context, error) {
console.log(context.controller);
// reset-password
console.log(error.name);
// AuthApiError
console.log(error.message);
// The password does not meet the complexity requirements
// of the current password policy.
console.log(error.statusCode);
// 403
});
afterRender
Triggered when the widget transitions to a new page and animations have finished. Returns a context
object containing the following properties:
- controller - Current controller name
// Overriding the "Back to Sign In" click action on the Forgot Password page
signIn.on('afterRender', function (context) {
if (context.controller !== 'forgot-password') {
return;
}
var backLink = document.getElementsByClassName('js-back')[0];
backLink.addEventListener('click', function (e) {
e.preventDefault();
e.stopPropagation();
// Custom link behavior
});
});
pageRendered
Triggered when the widget transitions to a new page and animations have finished.
signIn.on('pageRendered', function (data) {
console.log(data);
// { page: 'forgot-password' }
});
Building the Widget
We use Yarn as our node package manager. To install Yarn, check out their install documentation.
-
Clone this repo and navigate to the new
okta-signin-widget
folder.git clone https://github.com/okta/okta-signin-widget.git cd okta-signin-widget
-
Install our Node dependencies.
yarn install
-
Create a
.widgetrc.js
file in theokta-signin-widget
directory with an entry forbaseUrl
.module.exports = { baseUrl: 'https://{yourOktaDomain}', logoText: 'Windico', features: { rememberMe: true, }, }
-
Build the widget, start a local connect server that hosts it, and launch a browser window with the widget running.
yarn start
or start local connect server in watch mode, changes in
src/
andassets/sass/
folders will trigger browser auto reload.yarn start --watch
-
Finally, enable CORS support for our new server by following these instructions. You can now authenticate to Okta using your very own, customizable widget!
Build and test commands
Command | Description |
---|---|
yarn start |
Build the widget, start the server, and open a browser window with the widget loaded |
yarn start --watch |
Build the widget, start the server, and open a browser window with the widget loaded and watch on widget js and sass changes |
yarn build:dev |
Build an unminified version of the widget |
yarn build:release |
Build a minified, uglified version of the widget (okta-sign-in.min.js ) and a non-minified development version of the widget (okta-sign-in.js ). |
yarn test -t karma |
Run unit tests using Karma |
yarn test -t karma --suiteHelp |
Display optional test suite options |
yarn test -t jest |
Run unit tests using Jest |
yarn test -t jest --suiteHelp |
Display optional test suite options |
yarn test -t testcafe <browser> |
Run testcafe tests on selected browser (example: yarn test -t testcafe chrome ) |
yarn lint |
Run eslint and scss linting tests |
Local development workflow using yarn link
When developing locally, you may want to test local changes to the widget in another project, which is also local. To use yarn link
locally, follow these steps:
In okta-signin-widget
directory:
yarn build:release
yarn link
yarn build:webpack-dev --output-path ./dist/js --output-filename okta-sign-in.entry.js --watch
This will watch for changes in signin widget source code and automatically rebuild to the dist directory.
In your other local project directory:
yarn link @okta/okta-signin-widget
Utilizing Pseudo-loc
⚠️ This tool requires access to Okta's internal registry via the VPN.
A pseudo-localized language is a test language created to identify issues with the internationalization process. Generated from login.properties
English resources, the pseudo-loc properties file can be used to test UI's for English leaks and CSS layout issues caused due to localization.
To generate pseudo-loc, run the following command:
# Navigate into the pseudo-loc package
[okta-siginin-widget]$ cd packages/@okta/pseudo-loc/
# Install all required dependencies and generate login_ok_PL.propertiies
# NOTE: This requires VPN access
[pseudo-loc]$ yarn install
[pseudo-loc]$ yarn pseudo-loc
Finally, update the .widgetrc.js
file to use the ok_PL
language, and start the widget playground.
module.exports = {
baseUrl: 'https://{yourOktaDomain}',
language: 'ok-PL',
...
}
Browser support
Need to know if the Sign-In Widget supports your browser requirements? Please see Platforms, Browser, and OS Support.
Contributing
We're happy to accept contributions and PRs! Please see the contribution guide to understand how to structure a contribution.