Hi Everyone,
I’m currently working on integrating a biometric authentication solution called FaceTec with Okta. FaceTec consists of a client and an API, and the goal is to integrate it as an external Identity Provider (IdP) using the OpenID Connect (OIDC) protocol. After reviewing the Okta documentation, I’ve outlined the following authentication steps:
- The user clicks a link and is redirected to Okta.
- Okta redirects the user to our external provider’s
/authorize
endpoint. - Our external provider authenticates the user via FaceTec and returns an authorization code to Okta.
- Okta exchanges the authorization code for tokens and redirects back to a predefined
redirect_uri
. - The user is authenticated and granted access.
I would appreciate it if someone could help me validate whether this design is correctly structured or if there are any adjustments needed. Specifically, I’m looking for confirmation on:
- The accuracy of each step in aligning with OIDC protocols.
- Any common pitfalls or additional configurations required on both Okta and the external provider side to ensure a smooth integration.