Followed README, testing on my employer's dev Okta tenant. Using a custom domain name as the issuer, so it is different from the *-admin.oktapreview.com developer portal url.
Tested on Firefox. Steps taken:
- Run
npm install in both custom-login and okta-hosted-login
- Create new SPA application as per documentation (no option given to provide a base URL, so the documentation is out of date)
- Assign "Everyone" to application on developer portal
- Create
testenv file with issuer and client ID found on developer portal
- Run
npm start in custom-login project
- Attempt sign in and observe POST request to
{oktaBaseUrl}/api/v1/authn that returns HTTP 401
- Shut down
custom-login and run npm start in okta-hosted-login
- Attempt sign in to and observe GET request to
{oktaBaseUrl}/oauth2/default/api/v1/authorize that returns HTTP 200
- With a successful sign in, shut down
okta-hosted-login and restart custom-login
- Observe login form bypassed, due to valid cookie, and a successful authentication
Followed README, testing on my employer's dev Okta tenant. Using a custom domain name as the issuer, so it is different from the
*-admin.oktapreview.comdeveloper portal url.Tested on Firefox. Steps taken:
npm installin bothcustom-loginandokta-hosted-logintestenvfile with issuer and client ID found on developer portalnpm startincustom-loginproject{oktaBaseUrl}/api/v1/authnthat returnsHTTP 401custom-loginand runnpm startinokta-hosted-login{oktaBaseUrl}/oauth2/default/api/v1/authorizethat returnsHTTP 200okta-hosted-loginand restartcustom-login